2022-11-08 03:11:43,019 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-08 03:11:43,916 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-08 03:11:44.623  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Nov 08, 2022 3:11:46 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 08, 2022 3:11:46 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 08, 2022 3:11:46 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 08, 2022 3:11:46 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-08 03:11:47.468 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-08 03:11:47.751  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-11-08 03:11:47.907  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-08 03:11:49.010 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-08 03:11:49.013 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-08 03:11:49.015 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-08 03:11:49.019 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-08 03:11:49.063 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-11-08 03:11:49.066 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-08 03:11:49.196 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-11-08 03:11:50.000 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 08, 2022 3:11:50 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-08 03:11:51.141  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.168 seconds (JVM running for 11.664) Nov 08, 2022 3:12:14 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-08 04:06:02.558  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-08 04:06:02.581 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-08 04:06:02.652 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-08 04:06:02.660 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-08 04:06:02.685  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-08 04:06:02.688  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-08 04:06:02.690  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-08 04:06:02.692 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-08 04:06:02.693 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:06:02.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-08 04:06:02.708 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-08 04:06:02.712 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-08 04:06:02.760 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-08 04:06:02.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:06:02.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:06:02.771 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:06:03.557  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-08 04:06:03.560  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-08 04:06:03.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-08 04:06:03.562 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:06:03.571  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-08 04:06:03.572  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-08 04:06:03.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:06:03.574 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:06:03.574 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:06:03.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:06:03.606 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:06:03.606 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:06:03.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:06:03.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:06:03.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:06:03.618 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-08 04:06:03.666 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 242880688200239153237082164937628026804252225830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 08 02:50:18 UTC 2022 Final Date: Sun Nov 07 02:50:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:ab:bc:cd:3d:b7:8e:99:03:43:05:a0:55:ef:47:2c:50:5e:ac:49] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ee11e8b781f16af2058c41dc1513a0749a8ce5d 648ff9097e8768f039b71de94384d53bfe49daeb 9ab0a923aa46678bc431fcb1bdcdd1bdb56bea71 ecfd1c743012216945d40217e3c5bad03aa6b356 5c3a566db6442912cb8d9d8c2390b779d3e8643d d670fab405f4d4cb167c3b825b2b3eab118f3378 bbd477c623b3dc7c8c9c70ceb9ae557d750053a8 659ded7e04c72cb2b9e9381285a50cc46f7c4834 5a3fffa9d7ceb1c0d77ccfa2969f189662e7f055 dbd79d87e0051c9caf175953f70236d2ebe2d80e b139f6d2199b3a6ea047118fe7dfb22c3689f5d8 267ccb580f53bd293cbe5e011a99e4f1354a96bb 2a09a689cacede85c1ff28aa15e615de9d162322 6c43eb1be9a74cabc2184f848237800142aa8550 3ad6ca7fafd23ad2e3e4c435cbfaa4d4b1cac209 6c2ec953b4d4d75219bf1515b685901d43dec1c8 1b31a1e3c2132df91505e0a6b97a3969115c096a 2390871be047f833bf16952b6c1185972e24bc82 7dffa153d937ec60187a38d6961ea612ac0558d3 b2130b18 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:79:70:c4:e8:99:c9:23:0a:1e:86:cb:c2:81:64:18:3c:d2:c6:a9] modulus: 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 public exponent: 10001 ] 2022-11-08 04:07:50.445  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-08 04:07:50.447 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-08 04:07:50.449 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-08 04:07:50.450 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-08 04:07:50.450  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-08 04:07:50.451  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-08 04:07:50.451  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-08 04:07:50.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-08 04:07:50.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-08 04:07:50.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-08 04:07:50.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-08 04:07:50.469 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:07:50.469 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:07:50.470 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:07:50.676  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-08 04:07:50.677  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-08 04:07:50.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-08 04:07:50.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:07:50.683  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-08 04:07:50.683  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-08 04:07:50.684 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:07:50.685 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:07:50.685 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:07:50.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:07:50.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:07:50.689 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:07:50.690 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:07:50.691 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:07:50.691 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:07:50.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-08 04:07:50.700 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 242880688200239153237082164937628026804252225830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 08 02:50:18 UTC 2022 Final Date: Sun Nov 07 02:50:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:ab:bc:cd:3d:b7:8e:99:03:43:05:a0:55:ef:47:2c:50:5e:ac:49] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ee11e8b781f16af2058c41dc1513a0749a8ce5d 648ff9097e8768f039b71de94384d53bfe49daeb 9ab0a923aa46678bc431fcb1bdcdd1bdb56bea71 ecfd1c743012216945d40217e3c5bad03aa6b356 5c3a566db6442912cb8d9d8c2390b779d3e8643d d670fab405f4d4cb167c3b825b2b3eab118f3378 bbd477c623b3dc7c8c9c70ceb9ae557d750053a8 659ded7e04c72cb2b9e9381285a50cc46f7c4834 5a3fffa9d7ceb1c0d77ccfa2969f189662e7f055 dbd79d87e0051c9caf175953f70236d2ebe2d80e b139f6d2199b3a6ea047118fe7dfb22c3689f5d8 267ccb580f53bd293cbe5e011a99e4f1354a96bb 2a09a689cacede85c1ff28aa15e615de9d162322 6c43eb1be9a74cabc2184f848237800142aa8550 3ad6ca7fafd23ad2e3e4c435cbfaa4d4b1cac209 6c2ec953b4d4d75219bf1515b685901d43dec1c8 1b31a1e3c2132df91505e0a6b97a3969115c096a 2390871be047f833bf16952b6c1185972e24bc82 7dffa153d937ec60187a38d6961ea612ac0558d3 b2130b18 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:52:1e:fd:5d:50:c8:22:04:39:67:3a:f2:bc:40:7f:36:46:db:20] modulus: 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 public exponent: 10001 ] 2022-11-08 04:08:49.262  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-08 04:08:49.264 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-08 04:08:49.267 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-08 04:08:49.269 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-08 04:08:49.269  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-08 04:08:49.271  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-08 04:08:49.271  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-08 04:08:49.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-08 04:08:49.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-08 04:08:49.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-08 04:08:49.281 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-08 04:08:49.281 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:08:49.282 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:08:49.282 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:08:49.438  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-08 04:08:49.439  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-08 04:08:49.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-08 04:08:49.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:08:49.442  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-08 04:08:49.443  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-08 04:08:49.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:08:49.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:08:49.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:08:49.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:08:49.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:08:49.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:08:49.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:08:49.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:08:49.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:08:49.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-08 04:08:49.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 242880688200239153237082164937628026804252225830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 08 02:50:18 UTC 2022 Final Date: Sun Nov 07 02:50:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:ab:bc:cd:3d:b7:8e:99:03:43:05:a0:55:ef:47:2c:50:5e:ac:49] modulus: aba7f578acaf5d6f18b10225f89fc5a5333e248e708f8933f223ec3d0998169c051a2aab6cb7b195b17701f318c98e07a1dddf5e8ed7ac719917fc317d24bd202685bd1c01cd1a5a536f8ae859e49721058bee9759e1dae60fa318f8131bfebf8c0d4965dc566dfea7dad27af7f106ddca745cd697365c995e7405e0a59571513065805a8da2bf5ef6b3f218e60a226e5253e66764b1b56d8d1e593dcc7d11d3db0b64a35b8e2e323af309916c8d07462f2c541b926016a12343e32c4343e814c7ffa977c9e68dd1e25d76030329e0d30d4d3ba777e2b77be2f8a852c2e893ca7bef8b3e793c506a42a8f0328023690581adb53523bb2ba16e2fbc1aa98d1ae868be3cb7b8e2c5c90b1c95a3f8652f25b00a930f75571eefcbcf4f0e483e7ef924a94a7db7583d23e84562a0ed3e8fb6d92f7cf02ef11ebc530bbf89e4f4d7ce0253d44f8099c54bdcf54a9b13c50b2d9b35f33ba2aab41297212c070f7e1d1cbe63206d10aa2790aafa8edc7e96d7b9ea1404d9454ac79f29b51741deab74c5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ee11e8b781f16af2058c41dc1513a0749a8ce5d 648ff9097e8768f039b71de94384d53bfe49daeb 9ab0a923aa46678bc431fcb1bdcdd1bdb56bea71 ecfd1c743012216945d40217e3c5bad03aa6b356 5c3a566db6442912cb8d9d8c2390b779d3e8643d d670fab405f4d4cb167c3b825b2b3eab118f3378 bbd477c623b3dc7c8c9c70ceb9ae557d750053a8 659ded7e04c72cb2b9e9381285a50cc46f7c4834 5a3fffa9d7ceb1c0d77ccfa2969f189662e7f055 dbd79d87e0051c9caf175953f70236d2ebe2d80e b139f6d2199b3a6ea047118fe7dfb22c3689f5d8 267ccb580f53bd293cbe5e011a99e4f1354a96bb 2a09a689cacede85c1ff28aa15e615de9d162322 6c43eb1be9a74cabc2184f848237800142aa8550 3ad6ca7fafd23ad2e3e4c435cbfaa4d4b1cac209 6c2ec953b4d4d75219bf1515b685901d43dec1c8 1b31a1e3c2132df91505e0a6b97a3969115c096a 2390871be047f833bf16952b6c1185972e24bc82 7dffa153d937ec60187a38d6961ea612ac0558d3 b2130b18 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:93:93:ed:e2:ab:d5:dc:f3:c0:f7:00:80:4f:af:5e:6e:da:6e:da] modulus: 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 public exponent: 10001 ] 2022-11-08 04:10:47.972  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-08 04:10:47.975 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-08 04:10:47.980 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-08 04:10:47.981 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-08 04:10:47.981  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-08 04:10:47.983  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-08 04:10:47.984  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-08 04:10:47.984 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-08 04:10:47.985 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-08 04:10:47.985 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-08 04:10:47.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-08 04:10:47.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:10:47.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:10:47.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:10:48.120  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-08 04:10:48.121  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-08 04:10:48.122 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-08 04:10:48.122 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:10:48.124  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-08 04:10:48.125  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-08 04:10:48.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:10:48.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:10:48.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:10:48.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:10:48.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:10:48.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:10:48.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:10:48.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:10:48.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:10:48.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-08 04:10:48.137 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 242880688200239153237082164937628026804252225830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 08 02:50:18 UTC 2022 Final Date: Sun Nov 07 02:50:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:ab:bc:cd:3d:b7:8e:99:03:43:05:a0:55:ef:47:2c:50:5e:ac:49] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ee11e8b781f16af2058c41dc1513a0749a8ce5d 648ff9097e8768f039b71de94384d53bfe49daeb 9ab0a923aa46678bc431fcb1bdcdd1bdb56bea71 ecfd1c743012216945d40217e3c5bad03aa6b356 5c3a566db6442912cb8d9d8c2390b779d3e8643d d670fab405f4d4cb167c3b825b2b3eab118f3378 bbd477c623b3dc7c8c9c70ceb9ae557d750053a8 659ded7e04c72cb2b9e9381285a50cc46f7c4834 5a3fffa9d7ceb1c0d77ccfa2969f189662e7f055 dbd79d87e0051c9caf175953f70236d2ebe2d80e b139f6d2199b3a6ea047118fe7dfb22c3689f5d8 267ccb580f53bd293cbe5e011a99e4f1354a96bb 2a09a689cacede85c1ff28aa15e615de9d162322 6c43eb1be9a74cabc2184f848237800142aa8550 3ad6ca7fafd23ad2e3e4c435cbfaa4d4b1cac209 6c2ec953b4d4d75219bf1515b685901d43dec1c8 1b31a1e3c2132df91505e0a6b97a3969115c096a 2390871be047f833bf16952b6c1185972e24bc82 7dffa153d937ec60187a38d6961ea612ac0558d3 b2130b18 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:29:0b:ab:05:0b:2e:31:70:e6:a4:56:54:48:4f:a3:91:8f:d9:aa] modulus: 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 public exponent: 10001 ] 2022-11-08 04:20:27.906  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-08 04:20:27.911 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-08 04:20:27.914 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-08 04:20:27.915 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-08 04:20:27.916  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-08 04:20:27.917  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-08 04:20:27.917  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-08 04:20:27.918 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-08 04:20:27.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-08 04:20:27.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-08 04:20:27.925 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-08 04:20:27.927 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:20:27.927 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:20:27.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:20:28.137  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-08 04:20:28.138  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-08 04:20:28.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-08 04:20:28.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:20:28.140  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-08 04:20:28.141  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-08 04:20:28.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:20:28.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:20:28.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:20:28.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:20:28.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:20:28.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:20:28.145 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:20:28.145 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:20:28.145 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:20:28.147 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-08 04:20:28.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 242880688200239153237082164937628026804252225830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 08 02:50:18 UTC 2022 Final Date: Sun Nov 07 02:50:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:ab:bc:cd:3d:b7:8e:99:03:43:05:a0:55:ef:47:2c:50:5e:ac:49] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ee11e8b781f16af2058c41dc1513a0749a8ce5d 648ff9097e8768f039b71de94384d53bfe49daeb 9ab0a923aa46678bc431fcb1bdcdd1bdb56bea71 ecfd1c743012216945d40217e3c5bad03aa6b356 5c3a566db6442912cb8d9d8c2390b779d3e8643d d670fab405f4d4cb167c3b825b2b3eab118f3378 bbd477c623b3dc7c8c9c70ceb9ae557d750053a8 659ded7e04c72cb2b9e9381285a50cc46f7c4834 5a3fffa9d7ceb1c0d77ccfa2969f189662e7f055 dbd79d87e0051c9caf175953f70236d2ebe2d80e b139f6d2199b3a6ea047118fe7dfb22c3689f5d8 267ccb580f53bd293cbe5e011a99e4f1354a96bb 2a09a689cacede85c1ff28aa15e615de9d162322 6c43eb1be9a74cabc2184f848237800142aa8550 3ad6ca7fafd23ad2e3e4c435cbfaa4d4b1cac209 6c2ec953b4d4d75219bf1515b685901d43dec1c8 1b31a1e3c2132df91505e0a6b97a3969115c096a 2390871be047f833bf16952b6c1185972e24bc82 7dffa153d937ec60187a38d6961ea612ac0558d3 b2130b18 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:6a:de:08:18:43:c1:9a:bb:02:26:8a:37:59:1c:61:2f:e1:8e:e0] modulus: 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 public exponent: 10001 ] 2022-11-08 04:25:12.726  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-08 04:25:12.733 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-08 04:25:12.736 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-08 04:25:12.738 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-08 04:25:12.739  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-08 04:25:12.739  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-08 04:25:12.740  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-08 04:25:12.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-08 04:25:12.741 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-08 04:25:12.742 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-08 04:25:12.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-08 04:25:12.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:25:12.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:25:12.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:25:12.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-08 04:25:12.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-08 04:25:12.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-08 04:25:12.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:25:12.958  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-08 04:25:12.958  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-08 04:25:12.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:25:12.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:25:12.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:25:12.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:25:12.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:25:12.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:25:12.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:25:12.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:25:12.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:25:12.964 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-08 04:25:12.969 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 242880688200239153237082164937628026804252225830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 08 02:50:18 UTC 2022 Final Date: Sun Nov 07 02:50:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:ab:bc:cd:3d:b7:8e:99:03:43:05:a0:55:ef:47:2c:50:5e:ac:49] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ee11e8b781f16af2058c41dc1513a0749a8ce5d 648ff9097e8768f039b71de94384d53bfe49daeb 9ab0a923aa46678bc431fcb1bdcdd1bdb56bea71 ecfd1c743012216945d40217e3c5bad03aa6b356 5c3a566db6442912cb8d9d8c2390b779d3e8643d d670fab405f4d4cb167c3b825b2b3eab118f3378 bbd477c623b3dc7c8c9c70ceb9ae557d750053a8 659ded7e04c72cb2b9e9381285a50cc46f7c4834 5a3fffa9d7ceb1c0d77ccfa2969f189662e7f055 dbd79d87e0051c9caf175953f70236d2ebe2d80e b139f6d2199b3a6ea047118fe7dfb22c3689f5d8 267ccb580f53bd293cbe5e011a99e4f1354a96bb 2a09a689cacede85c1ff28aa15e615de9d162322 6c43eb1be9a74cabc2184f848237800142aa8550 3ad6ca7fafd23ad2e3e4c435cbfaa4d4b1cac209 6c2ec953b4d4d75219bf1515b685901d43dec1c8 1b31a1e3c2132df91505e0a6b97a3969115c096a 2390871be047f833bf16952b6c1185972e24bc82 7dffa153d937ec60187a38d6961ea612ac0558d3 b2130b18 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:47:95:a7:4f:30:0e:1c:89:8f:5c:37:18:5d:60:7c:7a:94:54:a4] modulus: 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 public exponent: 10001 ] 2022-11-08 04:25:29.601  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-08 04:25:29.602 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-08 04:25:29.603 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-08 04:25:29.604 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-08 04:25:29.604  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-08 04:25:29.605  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-08 04:25:29.605  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-08 04:25:29.606 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-08 04:25:29.606 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-08 04:25:29.606 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-08 04:25:29.611 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-08 04:25:29.612 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:25:29.612 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-08 04:25:29.612 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:25:29.777  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-08 04:25:29.778  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-08 04:25:29.778 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-08 04:25:29.778 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-08 04:25:29.781  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-08 04:25:29.781  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-08 04:25:29.782 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:25:29.782 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:25:29.782 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:25:29.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:25:29.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:25:29.791 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:25:29.792 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-08 04:25:29.792 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-08 04:25:29.792 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-08 04:25:29.801 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-08 04:25:29.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 242880688200239153237082164937628026804252225830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 08 02:50:18 UTC 2022 Final Date: Sun Nov 07 02:50:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [45:ab:bc:cd:3d:b7:8e:99:03:43:05:a0:55:ef:47:2c:50:5e:ac:49] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ee11e8b781f16af2058c41dc1513a0749a8ce5d 648ff9097e8768f039b71de94384d53bfe49daeb 9ab0a923aa46678bc431fcb1bdcdd1bdb56bea71 ecfd1c743012216945d40217e3c5bad03aa6b356 5c3a566db6442912cb8d9d8c2390b779d3e8643d d670fab405f4d4cb167c3b825b2b3eab118f3378 bbd477c623b3dc7c8c9c70ceb9ae557d750053a8 659ded7e04c72cb2b9e9381285a50cc46f7c4834 5a3fffa9d7ceb1c0d77ccfa2969f189662e7f055 dbd79d87e0051c9caf175953f70236d2ebe2d80e b139f6d2199b3a6ea047118fe7dfb22c3689f5d8 267ccb580f53bd293cbe5e011a99e4f1354a96bb 2a09a689cacede85c1ff28aa15e615de9d162322 6c43eb1be9a74cabc2184f848237800142aa8550 3ad6ca7fafd23ad2e3e4c435cbfaa4d4b1cac209 6c2ec953b4d4d75219bf1515b685901d43dec1c8 1b31a1e3c2132df91505e0a6b97a3969115c096a 2390871be047f833bf16952b6c1185972e24bc82 7dffa153d937ec60187a38d6961ea612ac0558d3 b2130b18 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:4f:88:dd:cb:6c:2d:12:f2:9b:fd:4d:5e:31:e1:b6:28:30:a3:05] modulus: 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 public exponent: 10001 ]