2023-01-07 03:01:55,399 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-07 03:01:57,054 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-07 03:01:57.846  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jan 07, 2023 3:02:00 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 07, 2023 3:02:00 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 07, 2023 3:02:00 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 07, 2023 3:02:00 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-07 03:02:00.733 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-07 03:02:01.067  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2023-01-07 03:02:01.261  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-07 03:02:02.081 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-07 03:02:02.087 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-07 03:02:02.090 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-07 03:02:02.097 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-07 03:02:02.153 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-07 03:02:02.160 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-07 03:02:02.342 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2023-01-07 03:02:03.035 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 07, 2023 3:02:03 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-07 03:02:04.000  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.679 seconds (JVM running for 11.848) Jan 07, 2023 3:02:22 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-07 03:03:13.705  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 03:03:13.721 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 03:03:13.815 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-07 03:03:13.837 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 03:03:13.885  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-07 03:03:13.889  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 03:03:13.891  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 03:03:13.894 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 03:03:13.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 03:03:13.901 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 03:03:13.961 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 03:03:13.973 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 03:03:14.077 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 03:03:14.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 03:03:14.095 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 03:03:14.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 03:03:14.949  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 03:03:14.955  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 03:03:14.956 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 03:03:14.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 03:03:14.968  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 03:03:14.969  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 03:03:14.970 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 03:03:14.970 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 03:03:14.971 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 03:03:14.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 03:03:14.990 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 03:03:14.990 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 03:03:15.002 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 03:03:15.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 03:03:15.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 03:03:15.005 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 03:03:15.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:8f:40:a4:e8:37:37:e9:cf:e0:e7:fa:9f:c6:27:8d:30:57:f8:ff],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:15:13.388  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 09:15:13.393 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 09:15:13.401 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:15:13.404 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:15:13.405  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:15:13.406  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 09:15:13.408  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 09:15:13.409 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 09:15:13.410 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 09:15:13.411 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 09:15:13.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 09:15:13.424 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:15:13.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:15:13.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:15:13.639  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 09:15:13.641  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 09:15:13.641 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 09:15:13.642 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:15:13.645  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 09:15:13.646  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 09:15:13.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:15:13.647 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:15:13.647 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:15:13.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:15:13.650 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:15:13.650 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:15:13.651 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:15:13.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:15:13.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:15:13.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:15:13.661 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:74:49:2f:6b:31:c6:e3:b3:b3:f4:0b:ce:9b:a7:0f:38:9e:54:c9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:17:15.808  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 09:17:15.810 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 09:17:15.813 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-07 09:17:15.815 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:17:15.815  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-07 09:17:15.816  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 09:17:15.817  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 09:17:15.818 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 09:17:15.819 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 09:17:15.821 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 09:17:15.826 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 09:17:15.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:17:15.832 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:17:15.833 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:17:15.947  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 09:17:15.948  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 09:17:15.948 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 09:17:15.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:17:15.953  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 09:17:15.954  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 09:17:15.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:17:15.955 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:17:15.955 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:17:15.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:17:15.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:17:15.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:17:15.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:17:15.959 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:17:15.959 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:17:15.961 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:17:15.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 96ea6d7c5b369bf05b0ebe2804a4b14f30154a256f84f369dcb0e1f47823404af5a760e8ae0910734bfa058a0519af616d85df2858351ff492705a3b3700e97a2111a50022bc8fe38edacee9cf8c7c4340c914b8956c2a65e7fec7716d35a9d71db8057f5494543e2251e1660e9fbab76ce692937db23e2a384b46219915750f301b268fd01fa00093bf4d1cf3db269e3182103be1eb604397f958816f10518029b94631859d632940bb86892fede90a09c52ef7cccd3aba2b28d9a3b351ed8a13792c9200c94063a18b6def96737d6782a7f4fcd449463737fd9e1344ef7444ac478ceed760087b617e385872e1e98a5c8768fddd4bef584152fc4a9def4f731e340e4a5a648b37e3ebdd7e0e13a8897032c9f8af9e18acd91ab6fabdabd950261d97329ae19e703c4193c9e19b5cdee5b383621443a9349a5d5128388a1e31b45c1a6a0d0c38d979d3b97fd5ff83e76ebdb89db6b40256a3a2c7c1997cefb09209e6987bc549b88088985dd915447200e8981c227fe9cecbfafa3fa24b8acb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:38:63:1b:d3:18:29:4d:0a:bd:d9:e8:9c:d1:12:15:f2:ec:23:71],[56:66:d1:a4] modulus: 98241e5feb9cc230f0afb7405966dc1b2dbf8f80d4fe2b22e18ac936adc90b963b5fcf205e54934513f02c7cb5abe4386d951fc77e2942a6bbea689d2cce5f8d2c8811adea9a939a3d85a99f312b42a8cea6125f24c51aae1e14c486692380f96adb27337135e115d6e72d392c67e55473dd0d1d8941446315588f4362ad7396007603b3b0de5deef6c4acfce79ed363c6d883924ee668be501bf7df49606a6f3bb8982a83b3ded7ff2f0d76562025e8ee10430c4a2182cac779cd50191e6948177f9f8d32498d3df76f23112977566e0acc103372cb0d1d2b06674a3f9b1976dd111b07b018d51c5a1ce58f3cce01a1070f8f1f2276bb2125bc40b11a9299db public exponent: 10001 ] 2023-01-07 09:19:27.833  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 09:19:27.836 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 09:19:27.838 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-07 09:19:27.839 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:19:27.840  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-07 09:19:27.840  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 09:19:27.841  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 09:19:27.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 09:19:27.842 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 09:19:27.843 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 09:19:27.847 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 09:19:27.850 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:19:27.851 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:19:27.851 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:19:27.966  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 09:19:27.967  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 09:19:27.968 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 09:19:27.968 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:19:27.971  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 09:19:27.972  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 09:19:27.973 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:19:27.973 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:19:27.974 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:19:27.975 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:19:27.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:19:27.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:19:27.978 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:19:27.978 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:19:27.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:19:27.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:19:27.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:8e:75:82:7a:08:b3:5d:64:4c:82:0f:87:32:fd:87:ac:c2:eb:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:22:07.313  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 09:22:07.315 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 09:22:07.317 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:22:07.317 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:22:07.317  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:22:07.318  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 09:22:07.322  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 09:22:07.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 09:22:07.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 09:22:07.325 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 09:22:07.344 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 09:22:07.345 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:22:07.345 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:22:07.345 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:22:07.508  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 09:22:07.509  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 09:22:07.509 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 09:22:07.510 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:22:07.512  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 09:22:07.514  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 09:22:07.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:22:07.515 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:22:07.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:22:07.518 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:22:07.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:22:07.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:22:07.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:22:07.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:22:07.522 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:22:07.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:22:07.527 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:21:05:9a:98:73:20:62:29:90:e2:22:f2:92:1a:8e:7b:06:82:bd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:29:34.309  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 09:29:34.317 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 09:29:34.322 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:29:34.324 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:29:34.325  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:29:34.326  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 09:29:34.327  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 09:29:34.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 09:29:34.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 09:29:34.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 09:29:34.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 09:29:34.338 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:29:34.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:29:34.340 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:29:34.482  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 09:29:34.483  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 09:29:34.483 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 09:29:34.483 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:29:34.485  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 09:29:34.486  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 09:29:34.486 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:29:34.487 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:29:34.487 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:29:34.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:29:34.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:29:34.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:29:34.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:29:34.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:29:34.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:29:34.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:29:34.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:25:e4:a5:31:cc:2b:6c:98:52:7c:fd:04:ae:23:6f:31:09:6e:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:35:33.937  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 09:35:33.942 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 09:35:33.945 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:35:33.946 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:35:33.947  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 09:35:33.947  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 09:35:33.948  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 09:35:33.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 09:35:33.949 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 09:35:33.950 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 09:35:33.955 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 09:35:33.956 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:35:33.957 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:35:33.957 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:35:34.085  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 09:35:34.086  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 09:35:34.086 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 09:35:34.087 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:35:34.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 09:35:34.089  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 09:35:34.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:35:34.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:35:34.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:35:34.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:35:34.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:35:34.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:35:34.093 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:35:34.094 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:35:34.094 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:35:34.095 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:35:34.101 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:b3:53:0e:48:9e:be:d5:8a:97:30:7f:6d:fe:2e:5c:1a:82:81:da],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:42:56.012  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 09:42:56.014 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 09:42:56.016 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-07 09:42:56.017 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:42:56.017  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-07 09:42:56.018  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 09:42:56.018  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 09:42:56.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 09:42:56.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 09:42:56.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 09:42:56.023 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 09:42:56.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:42:56.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:42:56.025 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:42:56.162  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 09:42:56.163  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 09:42:56.163 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 09:42:56.163 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:42:56.164  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 09:42:56.165  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 09:42:56.165 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:42:56.166 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:42:56.166 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:42:56.168 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:42:56.168 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:42:56.169 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:42:56.169 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:42:56.170 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:42:56.170 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:42:56.171 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:42:56.175 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 96ea6d7c5b369bf05b0ebe2804a4b14f30154a256f84f369dcb0e1f47823404af5a760e8ae0910734bfa058a0519af616d85df2858351ff492705a3b3700e97a2111a50022bc8fe38edacee9cf8c7c4340c914b8956c2a65e7fec7716d35a9d71db8057f5494543e2251e1660e9fbab76ce692937db23e2a384b46219915750f301b268fd01fa00093bf4d1cf3db269e3182103be1eb604397f958816f10518029b94631859d632940bb86892fede90a09c52ef7cccd3aba2b28d9a3b351ed8a13792c9200c94063a18b6def96737d6782a7f4fcd449463737fd9e1344ef7444ac478ceed760087b617e385872e1e98a5c8768fddd4bef584152fc4a9def4f731e340e4a5a648b37e3ebdd7e0e13a8897032c9f8af9e18acd91ab6fabdabd950261d97329ae19e703c4193c9e19b5cdee5b383621443a9349a5d5128388a1e31b45c1a6a0d0c38d979d3b97fd5ff83e76ebdb89db6b40256a3a2c7c1997cefb09209e6987bc549b88088985dd915447200e8981c227fe9cecbfafa3fa24b8acb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:cd:35:a9:ab:e5:1d:53:41:e7:e7:1d:23:2c:0e:17:09:f7:2a:36],[56:66:d1:a4] modulus: bfcee0ed18603bc1251be480aab2c8372cfc306673368685548a0c90de2b9e1e48e63c45c58275977840a09399fcdd5a5b914a60e5f0af515b37339166d4a45e0c1868cc6b87125ebbbb742c87268d5b9bda081bf7a95ef567ace00498201309a5abbec76519f360a296345bdb21d8daed2cadb5352a43c8d8866407353d8acc94146f7f89ad3fa54a9ed5ffbf78102a504fad576edecf4044887fd8a8d680b8fefb25a56d16966b2032b5d0b089df7b43a15b11953a1e84ead8697fec3fbc66835192fb2846913689e6430c0cee291fd82606f301871f948e8ad909e22d93f58d93a85a63a0ef31188c380e7e9b5ba90dcf2d078c4d610d2663e157b7132859 public exponent: 10001 ] 2023-01-07 09:50:41.306  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 09:50:41.309 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 09:50:41.312 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 09:50:41.313 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:50:41.313  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 09:50:41.314  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 09:50:41.315  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 09:50:41.315 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 09:50:41.316 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 09:50:41.316 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 09:50:41.321 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 09:50:41.322 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:50:41.322 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:50:41.323 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:50:41.470  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 09:50:41.471  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 09:50:41.471 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 09:50:41.472 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:50:41.473  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 09:50:41.474  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 09:50:41.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:50:41.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:50:41.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:50:41.476 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:50:41.477 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:50:41.477 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:50:41.479 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:50:41.479 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:50:41.480 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:50:41.481 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:50:41.485 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:e8:9f:98:89:50:94:8a:03:20:15:86:c9:64:b4:cf:11:c9:81:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 09:51:00.274  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 09:51:00.276 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 09:51:00.278 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 09:51:00.279 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 09:51:00.280  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 09:51:00.281  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 09:51:00.281  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 09:51:00.282 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 09:51:00.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 09:51:00.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 09:51:00.289 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 09:51:00.291 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:51:00.291 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 09:51:00.292 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:51:00.395  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 09:51:00.395  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 09:51:00.396 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 09:51:00.396 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 09:51:00.398  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 09:51:00.398  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 09:51:00.399 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:51:00.399 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:51:00.400 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:51:00.400 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:51:00.401 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:51:00.401 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:51:00.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 09:51:00.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 09:51:00.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 09:51:00.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 09:51:00.406 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:52:fb:37:17:1b:2d:89:6d:0d:01:38:d7:20:c4:40:6f:96:4b:85],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 10:16:58.370  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 10:16:58.373 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 10:16:58.377 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 10:16:58.378 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 10:16:58.379  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 10:16:58.379  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 10:16:58.380  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 10:16:58.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 10:16:58.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 10:16:58.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 10:16:58.385 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 10:16:58.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 10:16:58.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 10:16:58.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 10:16:58.537  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 10:16:58.537  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 10:16:58.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 10:16:58.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 10:16:58.540  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 10:16:58.540  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 10:16:58.540 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:16:58.541 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:16:58.541 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:16:58.542 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:16:58.542 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:16:58.543 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:16:58.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:16:58.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:16:58.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:16:58.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 10:16:58.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 96ea6d7c5b369bf05b0ebe2804a4b14f30154a256f84f369dcb0e1f47823404af5a760e8ae0910734bfa058a0519af616d85df2858351ff492705a3b3700e97a2111a50022bc8fe38edacee9cf8c7c4340c914b8956c2a65e7fec7716d35a9d71db8057f5494543e2251e1660e9fbab76ce692937db23e2a384b46219915750f301b268fd01fa00093bf4d1cf3db269e3182103be1eb604397f958816f10518029b94631859d632940bb86892fede90a09c52ef7cccd3aba2b28d9a3b351ed8a13792c9200c94063a18b6def96737d6782a7f4fcd449463737fd9e1344ef7444ac478ceed760087b617e385872e1e98a5c8768fddd4bef584152fc4a9def4f731e340e4a5a648b37e3ebdd7e0e13a8897032c9f8af9e18acd91ab6fabdabd950261d97329ae19e703c4193c9e19b5cdee5b383621443a9349a5d5128388a1e31b45c1a6a0d0c38d979d3b97fd5ff83e76ebdb89db6b40256a3a2c7c1997cefb09209e6987bc549b88088985dd915447200e8981c227fe9cecbfafa3fa24b8acb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:f9:0b:60:41:bb:e9:7f:3e:a9:f6:cf:f4:fd:8b:9b:29:6b:d3:2b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 10:17:05.723  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-07 10:17:05.724 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-07 10:17:05.725 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 10:17:05.726 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 10:17:05.726  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 10:17:05.727  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-07 10:17:05.727  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-07 10:17:05.728 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-07 10:17:05.728 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-07 10:17:05.728 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-07 10:17:05.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-07 10:17:05.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 10:17:05.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-07 10:17:05.735 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 10:17:05.833  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-07 10:17:05.834  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-07 10:17:05.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-07 10:17:05.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 10:17:05.836  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-07 10:17:05.837  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-07 10:17:05.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:17:05.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:17:05.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:17:05.839 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:17:05.840 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:17:05.840 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:17:05.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 10:17:05.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-07 10:17:05.842 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-07 10:17:05.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 10:17:05.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 455613780222000259412454706949152588008345170019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 02:59:51 UTC 2023 Final Date: Thu Jan 06 02:59:50 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:ca:2f:4c:65:64:e5:b0:2e:31:7b:bb:d1:c5:4d:f5:c0:47:0d:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5d21d99aefbba1c4ae3fecf05a19671a5e37d0d6 feae1556c1848a94763a42021e129b6bff507e41 dc6fd527c781de7e86676ff3338a309594fa7743 dc0535f4ca39725c91786ea8e8391110944cc8cb f0ae3eb5f31f22720e8696d5e7e6504a933b4eaf 731a6e9bddb80ba269dfe1d628e40c76a429d40c bc00c5baf30eb09881e7ec5ba0939b31f9505263 a649bd0e9597676ed8e12ef46be1ce2eb5a72730 c2d90bf7ace3cde21d06fe2e4b929249786dd927 c84929d993a58324917c94605b31de0d9b1408d9 1fb69704df550ee29d76e8719cbee048b05b0b1c 431d618f7a2d1bbb57860dab8a1133f493fed676 b1b6a5963539d24c1a124369dfe9cd0a6681370b a612b8c137595f87d17c77e1b51e7a194661eadf 007f73ef98d3d535135f1391125c1c28ca8e027c be3e9a161981a34b0128677e6327d27415dd4238 4ac97f979bd06779f1156e5c2aed84f208348ca0 6ef4f8fdd4b7d5f6dc734b8d5579d1b21956c65f ec176bcfb438964602147b47cd64d363a7d18908 9308e08d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:da:80:21:48:59:9f:80:85:4a:43:ca:0c:04:5c:0e:12:90:aa:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]