2022-04-19 01:31:36,400 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-19 01:31:40,985 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-19 01:31:44.086  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 19, 2022 1:31:53 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 19, 2022 1:31:53 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 19, 2022 1:31:53 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 19, 2022 1:31:54 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-19 01:31:56.498 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-19 01:31:57.789  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-19 01:31:58.584  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-19 01:32:01.493 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-19 01:32:01.497 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-04-19 01:32:01.499 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-19 01:32:01.501 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-19 01:32:01.704 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-19 01:32:01.706 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-04-19 01:32:02.294 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-19 01:32:07.185 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 19, 2022 1:32:10 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-19 01:32:11.887  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 39.373 seconds (JVM running for 47.746) Apr 19, 2022 1:32:19 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-19 01:33:03.485  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-19 01:33:03.496 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-19 01:33:03.696 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-19 01:33:03.700 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-19 01:33:03.796  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-19 01:33:03.798  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-19 01:33:03.799  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-19 01:33:03.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-19 01:33:03.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 01:33:03.802 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-19 01:33:03.891 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-19 01:33:03.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-19 01:33:04.088 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-19 01:33:04.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 01:33:04.092 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 01:33:04.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 01:33:05.624  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-19 01:33:05.627  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-19 01:33:05.627 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-19 01:33:05.629 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 01:33:05.637  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-19 01:33:05.638  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-19 01:33:05.682 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 01:33:05.684 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 01:33:05.684 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 01:33:05.784 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 01:33:05.785 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 01:33:05.785 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 01:33:05.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 01:33:05.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 01:33:05.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 01:33:05.795 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-19 01:33:05.987 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79169187978662936309822972015395694420251535110 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 19 01:28:32 UTC 2022 Final Date: Sun Apr 18 01:28:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [50:8b:9e:90:e1:18:87:f4:4a:1a:93:2d:b8:ac:db:8d:cc:4e:fe:ef] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c7cde8d629f1f68aad82bac6df2d901a8aaf657 51dff79d2c54e5872f42da56266c8773ddd177a6 710ae75fb58b71e4860dde2d9757e0e684e3e06b 0a63c69828dd69a8d849c9b13b6e3c9dce37433b eaca26efab461899c45772aff4839a5066fa1b49 5d942795e3610d3150d385b7f8594d2c97bf3e44 52b3e4022fb9ee84b4f20d4fcff7358c057b278f 86471a5c73dbc4d41ba8ae047ba01648bb55fc9c c8f4243194ccaacf5cfebde4848c15fab7a93048 7c9601736e915b29f0318d7b50e087a9195dc07c 863ffd50868d37d82551ccba759e3ff8a2e6a482 b285450ae8d9f6edc6a06e95a0bfb8488b239958 675e36444f32d6010e60f9d7c5400ca457456a89 0dc9fd54a7c0e0c0a52277d9853259d178bea1c9 9e1ac191887ebd424977f9b26015d5ad47c8d12f 0c6bc39ccee3283d2ef948bdb27cec326deca5d8 24af126743bda1a182ca3521b936290de125e719 35d98f53df3b7a3490db479e1bd705c53e5b63d6 3e39b271d05fa780e48534d8f463d8801a5f3bdb 9f07baec Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:14:2f:5f:af:9e:58:76:2e:df:dd:f5:78:13:1a:c4:c0:3f:a8:f0] modulus: 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 public exponent: 10001 ] 2022-04-19 03:13:44.134  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-19 03:13:44.137 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-19 03:13:44.140 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-19 03:13:44.141 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-19 03:13:44.142  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-19 03:13:44.143  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-19 03:13:44.143  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-19 03:13:44.144 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-19 03:13:44.144 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-19 03:13:44.145 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-19 03:13:44.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-19 03:13:44.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:13:44.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:13:44.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:13:44.436  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-19 03:13:44.437  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-19 03:13:44.438 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-19 03:13:44.438 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:13:44.441  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-19 03:13:44.441  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-19 03:13:44.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:13:44.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:13:44.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:13:44.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:13:44.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:13:44.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:13:44.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:13:44.485 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:13:44.485 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:13:44.486 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-19 03:13:44.491 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79169187978662936309822972015395694420251535110 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 19 01:28:32 UTC 2022 Final Date: Sun Apr 18 01:28:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [50:8b:9e:90:e1:18:87:f4:4a:1a:93:2d:b8:ac:db:8d:cc:4e:fe:ef] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c7cde8d629f1f68aad82bac6df2d901a8aaf657 51dff79d2c54e5872f42da56266c8773ddd177a6 710ae75fb58b71e4860dde2d9757e0e684e3e06b 0a63c69828dd69a8d849c9b13b6e3c9dce37433b eaca26efab461899c45772aff4839a5066fa1b49 5d942795e3610d3150d385b7f8594d2c97bf3e44 52b3e4022fb9ee84b4f20d4fcff7358c057b278f 86471a5c73dbc4d41ba8ae047ba01648bb55fc9c c8f4243194ccaacf5cfebde4848c15fab7a93048 7c9601736e915b29f0318d7b50e087a9195dc07c 863ffd50868d37d82551ccba759e3ff8a2e6a482 b285450ae8d9f6edc6a06e95a0bfb8488b239958 675e36444f32d6010e60f9d7c5400ca457456a89 0dc9fd54a7c0e0c0a52277d9853259d178bea1c9 9e1ac191887ebd424977f9b26015d5ad47c8d12f 0c6bc39ccee3283d2ef948bdb27cec326deca5d8 24af126743bda1a182ca3521b936290de125e719 35d98f53df3b7a3490db479e1bd705c53e5b63d6 3e39b271d05fa780e48534d8f463d8801a5f3bdb 9f07baec Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:0a:48:6f:ac:e5:aa:f5:75:60:5a:b4:78:d3:77:a6:51:be:7d:61] modulus: a2c23d72f60366a06ad3f205aa242478887e91ffad8af7ba4ff77d0112d9e2ae33ac9ac32c7127438600159289fe316b46f8ba38c42b7262926a26cc61be9c3d117ad10644a0c09c93d9a98d428bdf70f310744b80799c2dfb7dfbfc60475e4ad1d7312e7a9d5ac250dcc77a00ea7f580c5b9504ab07a71f1aa8e741bb4127a823c02f381f86b312ac4f54bc91487d58880cc5fc27093320ce1324d2983cb3206d848670fc9e42adfda867bedc00f32d077b52fa8492591db4dbd75800375f52e0b0c8e70ff0161220031c7720cd238a2359659cd5b03a348e098d900bd6827691ed849b410809f09e0cd9828369157e53361321bd4d511f542f64bd1999cfb5 public exponent: 10001 ] 2022-04-19 03:16:56.274  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-19 03:16:56.275 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-19 03:16:56.277 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-19 03:16:56.278 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-19 03:16:56.279  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-19 03:16:56.280  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-19 03:16:56.280  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-19 03:16:56.280 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-19 03:16:56.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-19 03:16:56.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-19 03:16:56.289 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-19 03:16:56.289 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:16:56.290 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:16:56.290 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:16:56.390  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-19 03:16:56.391  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-19 03:16:56.391 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-19 03:16:56.391 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:16:56.393  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-19 03:16:56.394  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-19 03:16:56.394 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:16:56.395 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:16:56.395 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:16:56.396 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:16:56.396 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:16:56.397 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:16:56.397 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:16:56.398 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:16:56.398 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:16:56.399 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-19 03:16:56.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79169187978662936309822972015395694420251535110 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 19 01:28:32 UTC 2022 Final Date: Sun Apr 18 01:28:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [50:8b:9e:90:e1:18:87:f4:4a:1a:93:2d:b8:ac:db:8d:cc:4e:fe:ef] modulus: b8480b971eb3ff38a1ac1843a2eab34aaffd15aac15b49a21178b50d689fba28e6c4e4d9e1ce363d1333db5ac10517acc4ff4d101b0d3dcb07bc6579e1ef418cc4afd8a7fdc599f48bc144a1a354ec49331b64346acba25c40d3c6a306205116c2183eb229db3c507a0eb1f999d2228a32ddb18241fe1c1de33770a40a4e68cb95066677e9a7af72b894ab3259eaa460c9a9f110005557b4a06279d832f535aa21d7acaa34d47e901c03773302a662c0234752efe2aff26736544c03f16fb1a6653849a04a71cf6efa5a3503aa6d6c8ec24bca0fd665d9b9b36ef5c42d04a75e739fc1ee621444fb4c5ca79d0c567f46da10603b4fe20b0db6fd5ce04bf649a51ce6cb4353ac039e5cd7bffcb4d78a5def4363099bcccd2eaf1183142f0464d729a2bd7ee52a35a3a4a2e71842774e6ef5cfd1cb5ba4d7decaa099dbf6431cf69f9ea20d265b93d82c86a93863fa4aafa49819c436241db4aa2be8198d00246e0f9bdf8bcafd4c5d3e38ae15027194ecf0bab3a3582430512a3e6c1af0d8410f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c7cde8d629f1f68aad82bac6df2d901a8aaf657 51dff79d2c54e5872f42da56266c8773ddd177a6 710ae75fb58b71e4860dde2d9757e0e684e3e06b 0a63c69828dd69a8d849c9b13b6e3c9dce37433b eaca26efab461899c45772aff4839a5066fa1b49 5d942795e3610d3150d385b7f8594d2c97bf3e44 52b3e4022fb9ee84b4f20d4fcff7358c057b278f 86471a5c73dbc4d41ba8ae047ba01648bb55fc9c c8f4243194ccaacf5cfebde4848c15fab7a93048 7c9601736e915b29f0318d7b50e087a9195dc07c 863ffd50868d37d82551ccba759e3ff8a2e6a482 b285450ae8d9f6edc6a06e95a0bfb8488b239958 675e36444f32d6010e60f9d7c5400ca457456a89 0dc9fd54a7c0e0c0a52277d9853259d178bea1c9 9e1ac191887ebd424977f9b26015d5ad47c8d12f 0c6bc39ccee3283d2ef948bdb27cec326deca5d8 24af126743bda1a182ca3521b936290de125e719 35d98f53df3b7a3490db479e1bd705c53e5b63d6 3e39b271d05fa780e48534d8f463d8801a5f3bdb 9f07baec Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:40:0f:ab:c2:88:a2:7c:ac:1c:90:f3:2a:66:70:95:80:be:ed:da] modulus: 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 public exponent: 10001 ] 2022-04-19 03:18:53.971  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-19 03:18:53.973 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-19 03:18:53.975 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-19 03:18:53.976 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-19 03:18:53.977  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-19 03:18:53.978  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-19 03:18:53.978  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-19 03:18:53.979 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-19 03:18:53.983 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-19 03:18:53.984 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-19 03:18:53.990 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-19 03:18:53.990 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:18:53.990 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:18:53.991 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:18:54.378  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-19 03:18:54.379  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-19 03:18:54.379 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-19 03:18:54.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:18:54.382  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-19 03:18:54.382  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-19 03:18:54.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:18:54.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:18:54.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:18:54.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:18:54.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:18:54.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:18:54.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:18:54.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:18:54.388 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:18:54.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-19 03:18:54.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79169187978662936309822972015395694420251535110 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 19 01:28:32 UTC 2022 Final Date: Sun Apr 18 01:28:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [50:8b:9e:90:e1:18:87:f4:4a:1a:93:2d:b8:ac:db:8d:cc:4e:fe:ef] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c7cde8d629f1f68aad82bac6df2d901a8aaf657 51dff79d2c54e5872f42da56266c8773ddd177a6 710ae75fb58b71e4860dde2d9757e0e684e3e06b 0a63c69828dd69a8d849c9b13b6e3c9dce37433b eaca26efab461899c45772aff4839a5066fa1b49 5d942795e3610d3150d385b7f8594d2c97bf3e44 52b3e4022fb9ee84b4f20d4fcff7358c057b278f 86471a5c73dbc4d41ba8ae047ba01648bb55fc9c c8f4243194ccaacf5cfebde4848c15fab7a93048 7c9601736e915b29f0318d7b50e087a9195dc07c 863ffd50868d37d82551ccba759e3ff8a2e6a482 b285450ae8d9f6edc6a06e95a0bfb8488b239958 675e36444f32d6010e60f9d7c5400ca457456a89 0dc9fd54a7c0e0c0a52277d9853259d178bea1c9 9e1ac191887ebd424977f9b26015d5ad47c8d12f 0c6bc39ccee3283d2ef948bdb27cec326deca5d8 24af126743bda1a182ca3521b936290de125e719 35d98f53df3b7a3490db479e1bd705c53e5b63d6 3e39b271d05fa780e48534d8f463d8801a5f3bdb 9f07baec Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:0a:8f:d1:7a:f4:6f:4b:11:16:df:73:ea:4b:00:74:2f:3c:6c:14] modulus: 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 public exponent: 10001 ] 2022-04-19 03:22:03.320  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-19 03:22:03.322 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-19 03:22:03.324 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-19 03:22:03.324 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-19 03:22:03.325  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-19 03:22:03.326  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-19 03:22:03.326  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-19 03:22:03.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-19 03:22:03.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-19 03:22:03.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-19 03:22:03.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-19 03:22:03.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:22:03.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:22:03.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:22:03.479  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-19 03:22:03.483  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-19 03:22:03.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-19 03:22:03.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:22:03.485  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-19 03:22:03.486  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-19 03:22:03.486 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:22:03.487 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:22:03.487 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:22:03.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:22:03.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:22:03.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:22:03.489 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:22:03.490 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:22:03.490 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:22:03.491 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-19 03:22:03.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79169187978662936309822972015395694420251535110 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 19 01:28:32 UTC 2022 Final Date: Sun Apr 18 01:28:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [50:8b:9e:90:e1:18:87:f4:4a:1a:93:2d:b8:ac:db:8d:cc:4e:fe:ef] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c7cde8d629f1f68aad82bac6df2d901a8aaf657 51dff79d2c54e5872f42da56266c8773ddd177a6 710ae75fb58b71e4860dde2d9757e0e684e3e06b 0a63c69828dd69a8d849c9b13b6e3c9dce37433b eaca26efab461899c45772aff4839a5066fa1b49 5d942795e3610d3150d385b7f8594d2c97bf3e44 52b3e4022fb9ee84b4f20d4fcff7358c057b278f 86471a5c73dbc4d41ba8ae047ba01648bb55fc9c c8f4243194ccaacf5cfebde4848c15fab7a93048 7c9601736e915b29f0318d7b50e087a9195dc07c 863ffd50868d37d82551ccba759e3ff8a2e6a482 b285450ae8d9f6edc6a06e95a0bfb8488b239958 675e36444f32d6010e60f9d7c5400ca457456a89 0dc9fd54a7c0e0c0a52277d9853259d178bea1c9 9e1ac191887ebd424977f9b26015d5ad47c8d12f 0c6bc39ccee3283d2ef948bdb27cec326deca5d8 24af126743bda1a182ca3521b936290de125e719 35d98f53df3b7a3490db479e1bd705c53e5b63d6 3e39b271d05fa780e48534d8f463d8801a5f3bdb 9f07baec Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:ca:0e:21:6d:59:63:53:46:86:2e:af:4a:58:b5:9f:4f:65:1a:c2] modulus: 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 public exponent: 10001 ] 2022-04-19 03:24:58.693  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-19 03:24:58.695 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-19 03:24:58.696 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-19 03:24:58.697 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-19 03:24:58.697  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-19 03:24:58.698  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-19 03:24:58.698  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-19 03:24:58.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-19 03:24:58.699 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-19 03:24:58.699 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-19 03:24:58.703 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-19 03:24:58.704 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:24:58.704 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:24:58.704 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:24:58.863  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-19 03:24:58.864  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-19 03:24:58.864 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-19 03:24:58.864 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:24:58.866  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-19 03:24:58.866  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-19 03:24:58.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:24:58.867 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:24:58.867 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:24:58.868 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:24:58.868 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:24:58.869 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:24:58.869 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:24:58.870 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:24:58.870 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:24:58.870 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-19 03:24:58.873 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79169187978662936309822972015395694420251535110 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 19 01:28:32 UTC 2022 Final Date: Sun Apr 18 01:28:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [50:8b:9e:90:e1:18:87:f4:4a:1a:93:2d:b8:ac:db:8d:cc:4e:fe:ef] modulus: b8480b971eb3ff38a1ac1843a2eab34aaffd15aac15b49a21178b50d689fba28e6c4e4d9e1ce363d1333db5ac10517acc4ff4d101b0d3dcb07bc6579e1ef418cc4afd8a7fdc599f48bc144a1a354ec49331b64346acba25c40d3c6a306205116c2183eb229db3c507a0eb1f999d2228a32ddb18241fe1c1de33770a40a4e68cb95066677e9a7af72b894ab3259eaa460c9a9f110005557b4a06279d832f535aa21d7acaa34d47e901c03773302a662c0234752efe2aff26736544c03f16fb1a6653849a04a71cf6efa5a3503aa6d6c8ec24bca0fd665d9b9b36ef5c42d04a75e739fc1ee621444fb4c5ca79d0c567f46da10603b4fe20b0db6fd5ce04bf649a51ce6cb4353ac039e5cd7bffcb4d78a5def4363099bcccd2eaf1183142f0464d729a2bd7ee52a35a3a4a2e71842774e6ef5cfd1cb5ba4d7decaa099dbf6431cf69f9ea20d265b93d82c86a93863fa4aafa49819c436241db4aa2be8198d00246e0f9bdf8bcafd4c5d3e38ae15027194ecf0bab3a3582430512a3e6c1af0d8410f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c7cde8d629f1f68aad82bac6df2d901a8aaf657 51dff79d2c54e5872f42da56266c8773ddd177a6 710ae75fb58b71e4860dde2d9757e0e684e3e06b 0a63c69828dd69a8d849c9b13b6e3c9dce37433b eaca26efab461899c45772aff4839a5066fa1b49 5d942795e3610d3150d385b7f8594d2c97bf3e44 52b3e4022fb9ee84b4f20d4fcff7358c057b278f 86471a5c73dbc4d41ba8ae047ba01648bb55fc9c c8f4243194ccaacf5cfebde4848c15fab7a93048 7c9601736e915b29f0318d7b50e087a9195dc07c 863ffd50868d37d82551ccba759e3ff8a2e6a482 b285450ae8d9f6edc6a06e95a0bfb8488b239958 675e36444f32d6010e60f9d7c5400ca457456a89 0dc9fd54a7c0e0c0a52277d9853259d178bea1c9 9e1ac191887ebd424977f9b26015d5ad47c8d12f 0c6bc39ccee3283d2ef948bdb27cec326deca5d8 24af126743bda1a182ca3521b936290de125e719 35d98f53df3b7a3490db479e1bd705c53e5b63d6 3e39b271d05fa780e48534d8f463d8801a5f3bdb 9f07baec Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:ae:d4:dc:57:f5:9a:af:b3:65:a7:42:8f:97:0b:e6:2c:ef:82:32] modulus: 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 public exponent: 10001 ] 2022-04-19 03:28:21.540  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-19 03:28:21.542 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-19 03:28:21.544 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-19 03:28:21.545 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-19 03:28:21.545  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-19 03:28:21.546  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-19 03:28:21.546  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-19 03:28:21.546 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-19 03:28:21.547 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-19 03:28:21.547 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-19 03:28:21.551 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-19 03:28:21.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:28:21.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:28:21.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:28:21.678  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-19 03:28:21.679  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-19 03:28:21.679 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-19 03:28:21.680 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:28:21.681  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-19 03:28:21.682  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-19 03:28:21.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:28:21.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:28:21.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:28:21.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:28:21.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:28:21.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:28:21.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:28:21.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:28:21.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:28:21.685 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-19 03:28:21.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79169187978662936309822972015395694420251535110 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 19 01:28:32 UTC 2022 Final Date: Sun Apr 18 01:28:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [50:8b:9e:90:e1:18:87:f4:4a:1a:93:2d:b8:ac:db:8d:cc:4e:fe:ef] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c7cde8d629f1f68aad82bac6df2d901a8aaf657 51dff79d2c54e5872f42da56266c8773ddd177a6 710ae75fb58b71e4860dde2d9757e0e684e3e06b 0a63c69828dd69a8d849c9b13b6e3c9dce37433b eaca26efab461899c45772aff4839a5066fa1b49 5d942795e3610d3150d385b7f8594d2c97bf3e44 52b3e4022fb9ee84b4f20d4fcff7358c057b278f 86471a5c73dbc4d41ba8ae047ba01648bb55fc9c c8f4243194ccaacf5cfebde4848c15fab7a93048 7c9601736e915b29f0318d7b50e087a9195dc07c 863ffd50868d37d82551ccba759e3ff8a2e6a482 b285450ae8d9f6edc6a06e95a0bfb8488b239958 675e36444f32d6010e60f9d7c5400ca457456a89 0dc9fd54a7c0e0c0a52277d9853259d178bea1c9 9e1ac191887ebd424977f9b26015d5ad47c8d12f 0c6bc39ccee3283d2ef948bdb27cec326deca5d8 24af126743bda1a182ca3521b936290de125e719 35d98f53df3b7a3490db479e1bd705c53e5b63d6 3e39b271d05fa780e48534d8f463d8801a5f3bdb 9f07baec Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2d:88:c5:9d:6e:47:31:d4:5b:b3:73:49:e6:f1:99:7a:46:64:c3:21] modulus: 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 public exponent: 10001 ] 2022-04-19 03:30:44.985  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-19 03:30:44.986 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-19 03:30:44.988 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-19 03:30:44.988 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-19 03:30:44.989  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-19 03:30:44.989  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-19 03:30:44.990  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-19 03:30:44.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-19 03:30:44.991 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-19 03:30:44.991 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-19 03:30:44.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-19 03:30:44.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:30:44.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:30:44.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:30:45.112  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-19 03:30:45.112  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-19 03:30:45.112 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-19 03:30:45.112 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:30:45.114  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-19 03:30:45.114  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-19 03:30:45.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:30:45.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:30:45.115 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:30:45.115 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:30:45.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:30:45.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:30:45.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:30:45.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:30:45.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:30:45.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-19 03:30:45.120 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79169187978662936309822972015395694420251535110 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 19 01:28:32 UTC 2022 Final Date: Sun Apr 18 01:28:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [50:8b:9e:90:e1:18:87:f4:4a:1a:93:2d:b8:ac:db:8d:cc:4e:fe:ef] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c7cde8d629f1f68aad82bac6df2d901a8aaf657 51dff79d2c54e5872f42da56266c8773ddd177a6 710ae75fb58b71e4860dde2d9757e0e684e3e06b 0a63c69828dd69a8d849c9b13b6e3c9dce37433b eaca26efab461899c45772aff4839a5066fa1b49 5d942795e3610d3150d385b7f8594d2c97bf3e44 52b3e4022fb9ee84b4f20d4fcff7358c057b278f 86471a5c73dbc4d41ba8ae047ba01648bb55fc9c c8f4243194ccaacf5cfebde4848c15fab7a93048 7c9601736e915b29f0318d7b50e087a9195dc07c 863ffd50868d37d82551ccba759e3ff8a2e6a482 b285450ae8d9f6edc6a06e95a0bfb8488b239958 675e36444f32d6010e60f9d7c5400ca457456a89 0dc9fd54a7c0e0c0a52277d9853259d178bea1c9 9e1ac191887ebd424977f9b26015d5ad47c8d12f 0c6bc39ccee3283d2ef948bdb27cec326deca5d8 24af126743bda1a182ca3521b936290de125e719 35d98f53df3b7a3490db479e1bd705c53e5b63d6 3e39b271d05fa780e48534d8f463d8801a5f3bdb 9f07baec Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [57:2f:e3:44:42:a6:1e:5f:91:0c:a9:14:f7:c6:06:5d:62:b9:33:eb] modulus: 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 public exponent: 10001 ] 2022-04-19 03:38:00.273  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-19 03:38:00.274 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-19 03:38:00.276 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-19 03:38:00.276 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-19 03:38:00.277  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-19 03:38:00.277  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-19 03:38:00.277  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-19 03:38:00.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-19 03:38:00.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-19 03:38:00.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-19 03:38:00.287 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-19 03:38:00.288 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:38:00.288 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:38:00.288 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:38:00.396  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-19 03:38:00.397  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-19 03:38:00.397 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-19 03:38:00.397 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:38:00.399  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-19 03:38:00.400  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-19 03:38:00.400 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:38:00.401 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:38:00.401 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:38:00.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:38:00.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:38:00.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:38:00.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:38:00.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:38:00.404 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:38:00.405 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-19 03:38:00.408 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79169187978662936309822972015395694420251535110 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 19 01:28:32 UTC 2022 Final Date: Sun Apr 18 01:28:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [50:8b:9e:90:e1:18:87:f4:4a:1a:93:2d:b8:ac:db:8d:cc:4e:fe:ef] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c7cde8d629f1f68aad82bac6df2d901a8aaf657 51dff79d2c54e5872f42da56266c8773ddd177a6 710ae75fb58b71e4860dde2d9757e0e684e3e06b 0a63c69828dd69a8d849c9b13b6e3c9dce37433b eaca26efab461899c45772aff4839a5066fa1b49 5d942795e3610d3150d385b7f8594d2c97bf3e44 52b3e4022fb9ee84b4f20d4fcff7358c057b278f 86471a5c73dbc4d41ba8ae047ba01648bb55fc9c c8f4243194ccaacf5cfebde4848c15fab7a93048 7c9601736e915b29f0318d7b50e087a9195dc07c 863ffd50868d37d82551ccba759e3ff8a2e6a482 b285450ae8d9f6edc6a06e95a0bfb8488b239958 675e36444f32d6010e60f9d7c5400ca457456a89 0dc9fd54a7c0e0c0a52277d9853259d178bea1c9 9e1ac191887ebd424977f9b26015d5ad47c8d12f 0c6bc39ccee3283d2ef948bdb27cec326deca5d8 24af126743bda1a182ca3521b936290de125e719 35d98f53df3b7a3490db479e1bd705c53e5b63d6 3e39b271d05fa780e48534d8f463d8801a5f3bdb 9f07baec Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [27:45:7c:3a:fa:e1:35:37:5b:66:cb:67:cf:6b:13:ba:f8:3b:ee:50] modulus: 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 public exponent: 10001 ] 2022-04-19 03:38:47.435  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-19 03:38:47.436 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-19 03:38:47.437 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-19 03:38:47.438 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-19 03:38:47.438  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-19 03:38:47.438  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-19 03:38:47.439  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-19 03:38:47.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-19 03:38:47.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-19 03:38:47.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-19 03:38:47.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-19 03:38:47.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:38:47.445 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-19 03:38:47.445 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:38:47.571  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-19 03:38:47.572  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-19 03:38:47.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-19 03:38:47.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-19 03:38:47.574  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-19 03:38:47.574  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-19 03:38:47.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:38:47.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:38:47.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:38:47.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:38:47.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:38:47.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:38:47.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-19 03:38:47.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-19 03:38:47.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-19 03:38:47.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-19 03:38:47.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 79169187978662936309822972015395694420251535110 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 19 01:28:32 UTC 2022 Final Date: Sun Apr 18 01:28:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [50:8b:9e:90:e1:18:87:f4:4a:1a:93:2d:b8:ac:db:8d:cc:4e:fe:ef] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5c7cde8d629f1f68aad82bac6df2d901a8aaf657 51dff79d2c54e5872f42da56266c8773ddd177a6 710ae75fb58b71e4860dde2d9757e0e684e3e06b 0a63c69828dd69a8d849c9b13b6e3c9dce37433b eaca26efab461899c45772aff4839a5066fa1b49 5d942795e3610d3150d385b7f8594d2c97bf3e44 52b3e4022fb9ee84b4f20d4fcff7358c057b278f 86471a5c73dbc4d41ba8ae047ba01648bb55fc9c c8f4243194ccaacf5cfebde4848c15fab7a93048 7c9601736e915b29f0318d7b50e087a9195dc07c 863ffd50868d37d82551ccba759e3ff8a2e6a482 b285450ae8d9f6edc6a06e95a0bfb8488b239958 675e36444f32d6010e60f9d7c5400ca457456a89 0dc9fd54a7c0e0c0a52277d9853259d178bea1c9 9e1ac191887ebd424977f9b26015d5ad47c8d12f 0c6bc39ccee3283d2ef948bdb27cec326deca5d8 24af126743bda1a182ca3521b936290de125e719 35d98f53df3b7a3490db479e1bd705c53e5b63d6 3e39b271d05fa780e48534d8f463d8801a5f3bdb 9f07baec Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:ec:0b:e4:9c:0e:c8:ff:de:e2:c3:11:1e:d2:d5:60:15:3c:e6:6c] modulus: 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 public exponent: 10001 ]