2022-11-24 02:52:40,283 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-24 02:52:41,161 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-24 02:52:41.803  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Nov 24, 2022 2:52:43 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 24, 2022 2:52:43 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 24, 2022 2:52:43 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 24, 2022 2:52:43 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-24 02:52:44.063 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-24 02:52:44.333  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-11-24 02:52:44.504  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-24 02:52:45.178 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-24 02:52:45.181 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-24 02:52:45.182 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-24 02:52:45.186 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-24 02:52:45.220 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-24 02:52:45.223 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-11-24 02:52:45.333 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-11-24 02:52:45.975 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 24, 2022 2:52:46 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-24 02:52:46.903  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.395 seconds (JVM running for 9.161) Nov 24, 2022 2:53:10 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-24 02:53:54.699  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-24 02:53:54.706 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-24 02:53:54.744 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-24 02:53:54.747 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-24 02:53:54.763  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-24 02:53:54.765  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-24 02:53:54.766  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-24 02:53:54.767 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-24 02:53:54.768 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 02:53:54.771 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-24 02:53:54.779 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-24 02:53:54.782 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-24 02:53:54.828 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-24 02:53:54.833 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 02:53:54.834 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 02:53:54.837 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 02:53:55.385  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-24 02:53:55.387  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-24 02:53:55.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-24 02:53:55.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 02:53:55.399  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-24 02:53:55.400  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-24 02:53:55.400 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 02:53:55.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 02:53:55.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 02:53:55.423 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 02:53:55.424 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 02:53:55.425 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 02:53:55.433 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 02:53:55.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 02:53:55.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 02:53:55.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-24 02:53:55.466 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492095192861852110478739907432134459182516260598 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 24 02:50:11 UTC 2022 Final Date: Tue Nov 23 02:50:10 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:b4:84:55:b9:6a:0d:f3:ab:e7:e4:11:02:d0:5a:a5:fc:f4:94:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8873262f1163be9b55bd02dc872ccaf3fe4b5789 c65c5ec1a99f2a3d1ed5656761da9a5289313f75 42115706fe4e450f940a8779c895b80baf7ef37d cb9a8414900569991b16d21c7eff63398ba4640f ae522e6ffeceaab79943bd1eb94df4db8814c552 b9016c6b13abc38fb16c0cddc8c60f022f97dc6b 0299012a4ede899ccb953137f10e0ef65f1854ee 8162c40779ec5fcbc9844e3b4336704cc4b69797 cf363b48df36894aba9f33a23adbfdedec59a013 3a46cc3e68131452be902f548db65487620e0f4e ee19f2e529a6869a72a5e78e3c96767f898da730 760c81dc06a950ab18e85d9049617815ad38d1a3 ddc4e638af7519af035dca703eafddafb6619f7c 1f996833dcc84be7cdf786932c86c5c0ffbb6729 0d7b5434c7e104d0a8633cc8a252b6b6e9904436 24ea4e377ad339b898e625813da7c7c03e07105a f22267c5011cec7f4fc0d3059e8ebc8497ea289b baf1c52248709367de45d1712188dc0340833fdc bfbb4dee8151efb8a8c24deceadb46886c72506c 060ff51c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:ab:28:52:06:05:e0:8f:bf:7c:22:30:53:83:67:c4:07:0b:6a:80],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-24 04:08:26.477  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-24 04:08:26.480 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-24 04:08:26.483 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-24 04:08:26.484 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-24 04:08:26.485  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-24 04:08:26.486  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-24 04:08:26.486  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-24 04:08:26.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-24 04:08:26.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-24 04:08:26.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-24 04:08:26.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-24 04:08:26.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:08:26.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:08:26.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:08:26.657  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-24 04:08:26.657  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-24 04:08:26.658 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-24 04:08:26.658 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:08:26.661  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-24 04:08:26.661  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-24 04:08:26.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:08:26.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:08:26.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:08:26.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:08:26.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:08:26.665 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:08:26.665 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:08:26.666 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:08:26.666 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:08:26.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-24 04:08:26.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492095192861852110478739907432134459182516260598 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 24 02:50:11 UTC 2022 Final Date: Tue Nov 23 02:50:10 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:b4:84:55:b9:6a:0d:f3:ab:e7:e4:11:02:d0:5a:a5:fc:f4:94:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8873262f1163be9b55bd02dc872ccaf3fe4b5789 c65c5ec1a99f2a3d1ed5656761da9a5289313f75 42115706fe4e450f940a8779c895b80baf7ef37d cb9a8414900569991b16d21c7eff63398ba4640f ae522e6ffeceaab79943bd1eb94df4db8814c552 b9016c6b13abc38fb16c0cddc8c60f022f97dc6b 0299012a4ede899ccb953137f10e0ef65f1854ee 8162c40779ec5fcbc9844e3b4336704cc4b69797 cf363b48df36894aba9f33a23adbfdedec59a013 3a46cc3e68131452be902f548db65487620e0f4e ee19f2e529a6869a72a5e78e3c96767f898da730 760c81dc06a950ab18e85d9049617815ad38d1a3 ddc4e638af7519af035dca703eafddafb6619f7c 1f996833dcc84be7cdf786932c86c5c0ffbb6729 0d7b5434c7e104d0a8633cc8a252b6b6e9904436 24ea4e377ad339b898e625813da7c7c03e07105a f22267c5011cec7f4fc0d3059e8ebc8497ea289b baf1c52248709367de45d1712188dc0340833fdc bfbb4dee8151efb8a8c24deceadb46886c72506c 060ff51c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:86:08:13:a0:02:b3:1f:5c:c3:ad:7a:2c:46:49:da:af:b0:57:34],[56:66:d1:a4] modulus: d4b1a303aa344542d23d01c23b2e559005cfc7a206a756dd1a71d2853e832b9be289bfaa12d2b26618a9b51041ed2343cdf2b69c85b23a2d3aaec29aacde0105b955fa995ae1ccedaa347e3e595b92eb64c5df6711847741d6355dc30fc8a564cd9f01813db922e28a3f3e027332bb3245f2cd799202f1771ece992d467ac06f26a6a7c4fff73e2d381bf4108ed0c17fc2b98a53aec0bb3b7ef2ac49ff590d609737d5b495ddb75e39e038cddeba8dbee4e47cb6bd2415fe7793d7d727c1c5389c322a8b83a9c9636e70e5b9c63a0d4a1a53975bf63aa856ca1836a227383a7f875ff193dd2e4bb2031aa674d1f20d720b69787aa882ceced1358ff3abbefeb1 public exponent: 10001 ] 2022-11-24 04:10:14.348  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-24 04:10:14.350 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-24 04:10:14.351 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-24 04:10:14.352 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-24 04:10:14.353  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-24 04:10:14.354  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-24 04:10:14.354  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-24 04:10:14.355 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-24 04:10:14.355 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-24 04:10:14.356 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-24 04:10:14.361 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-24 04:10:14.362 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:10:14.362 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:10:14.362 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:10:14.531  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-24 04:10:14.539  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-24 04:10:14.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-24 04:10:14.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:10:14.549  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-24 04:10:14.550  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-24 04:10:14.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:10:14.551 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:10:14.551 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:10:14.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:10:14.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:10:14.554 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:10:14.555 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:10:14.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:10:14.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:10:14.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-24 04:10:14.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492095192861852110478739907432134459182516260598 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 24 02:50:11 UTC 2022 Final Date: Tue Nov 23 02:50:10 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:b4:84:55:b9:6a:0d:f3:ab:e7:e4:11:02:d0:5a:a5:fc:f4:94:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8873262f1163be9b55bd02dc872ccaf3fe4b5789 c65c5ec1a99f2a3d1ed5656761da9a5289313f75 42115706fe4e450f940a8779c895b80baf7ef37d cb9a8414900569991b16d21c7eff63398ba4640f ae522e6ffeceaab79943bd1eb94df4db8814c552 b9016c6b13abc38fb16c0cddc8c60f022f97dc6b 0299012a4ede899ccb953137f10e0ef65f1854ee 8162c40779ec5fcbc9844e3b4336704cc4b69797 cf363b48df36894aba9f33a23adbfdedec59a013 3a46cc3e68131452be902f548db65487620e0f4e ee19f2e529a6869a72a5e78e3c96767f898da730 760c81dc06a950ab18e85d9049617815ad38d1a3 ddc4e638af7519af035dca703eafddafb6619f7c 1f996833dcc84be7cdf786932c86c5c0ffbb6729 0d7b5434c7e104d0a8633cc8a252b6b6e9904436 24ea4e377ad339b898e625813da7c7c03e07105a f22267c5011cec7f4fc0d3059e8ebc8497ea289b baf1c52248709367de45d1712188dc0340833fdc bfbb4dee8151efb8a8c24deceadb46886c72506c 060ff51c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:96:a5:e9:3d:66:91:10:68:98:f5:65:e1:28:91:ca:f0:40:ad:64],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-24 04:12:00.201  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-24 04:12:00.203 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-24 04:12:00.206 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-24 04:12:00.207 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-24 04:12:00.207  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-24 04:12:00.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-24 04:12:00.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-24 04:12:00.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-24 04:12:00.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-24 04:12:00.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-24 04:12:00.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-24 04:12:00.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:12:00.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:12:00.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:12:00.365  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-24 04:12:00.366  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-24 04:12:00.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-24 04:12:00.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:12:00.369  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-24 04:12:00.369  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-24 04:12:00.370 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:12:00.370 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:12:00.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:12:00.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:12:00.372 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:12:00.372 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:12:00.373 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:12:00.373 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:12:00.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:12:00.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-24 04:12:00.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492095192861852110478739907432134459182516260598 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 24 02:50:11 UTC 2022 Final Date: Tue Nov 23 02:50:10 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:b4:84:55:b9:6a:0d:f3:ab:e7:e4:11:02:d0:5a:a5:fc:f4:94:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8873262f1163be9b55bd02dc872ccaf3fe4b5789 c65c5ec1a99f2a3d1ed5656761da9a5289313f75 42115706fe4e450f940a8779c895b80baf7ef37d cb9a8414900569991b16d21c7eff63398ba4640f ae522e6ffeceaab79943bd1eb94df4db8814c552 b9016c6b13abc38fb16c0cddc8c60f022f97dc6b 0299012a4ede899ccb953137f10e0ef65f1854ee 8162c40779ec5fcbc9844e3b4336704cc4b69797 cf363b48df36894aba9f33a23adbfdedec59a013 3a46cc3e68131452be902f548db65487620e0f4e ee19f2e529a6869a72a5e78e3c96767f898da730 760c81dc06a950ab18e85d9049617815ad38d1a3 ddc4e638af7519af035dca703eafddafb6619f7c 1f996833dcc84be7cdf786932c86c5c0ffbb6729 0d7b5434c7e104d0a8633cc8a252b6b6e9904436 24ea4e377ad339b898e625813da7c7c03e07105a f22267c5011cec7f4fc0d3059e8ebc8497ea289b baf1c52248709367de45d1712188dc0340833fdc bfbb4dee8151efb8a8c24deceadb46886c72506c 060ff51c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:75:63:5f:4e:e3:12:e3:2b:c9:ea:3d:5e:bc:ec:9e:f2:23:6a:c3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-24 04:14:49.241  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-24 04:14:49.243 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-24 04:14:49.244 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-24 04:14:49.245 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-24 04:14:49.245  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-24 04:14:49.246  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-24 04:14:49.246  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-24 04:14:49.247 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-24 04:14:49.247 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-24 04:14:49.247 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-24 04:14:49.251 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-24 04:14:49.252 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:14:49.252 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:14:49.252 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:14:49.396  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-24 04:14:49.396  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-24 04:14:49.397 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-24 04:14:49.397 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:14:49.398  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-24 04:14:49.399  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-24 04:14:49.399 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:14:49.400 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:14:49.400 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:14:49.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:14:49.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:14:49.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:14:49.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:14:49.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:14:49.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:14:49.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-24 04:14:49.406 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492095192861852110478739907432134459182516260598 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 24 02:50:11 UTC 2022 Final Date: Tue Nov 23 02:50:10 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:b4:84:55:b9:6a:0d:f3:ab:e7:e4:11:02:d0:5a:a5:fc:f4:94:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8873262f1163be9b55bd02dc872ccaf3fe4b5789 c65c5ec1a99f2a3d1ed5656761da9a5289313f75 42115706fe4e450f940a8779c895b80baf7ef37d cb9a8414900569991b16d21c7eff63398ba4640f ae522e6ffeceaab79943bd1eb94df4db8814c552 b9016c6b13abc38fb16c0cddc8c60f022f97dc6b 0299012a4ede899ccb953137f10e0ef65f1854ee 8162c40779ec5fcbc9844e3b4336704cc4b69797 cf363b48df36894aba9f33a23adbfdedec59a013 3a46cc3e68131452be902f548db65487620e0f4e ee19f2e529a6869a72a5e78e3c96767f898da730 760c81dc06a950ab18e85d9049617815ad38d1a3 ddc4e638af7519af035dca703eafddafb6619f7c 1f996833dcc84be7cdf786932c86c5c0ffbb6729 0d7b5434c7e104d0a8633cc8a252b6b6e9904436 24ea4e377ad339b898e625813da7c7c03e07105a f22267c5011cec7f4fc0d3059e8ebc8497ea289b baf1c52248709367de45d1712188dc0340833fdc bfbb4dee8151efb8a8c24deceadb46886c72506c 060ff51c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:37:30:d6:27:af:b6:cf:e2:ed:4b:f4:50:d0:ce:57:72:e7:21:18],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-24 04:23:10.943  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-24 04:23:10.949 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-24 04:23:10.951 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-24 04:23:10.952 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-24 04:23:10.953  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-24 04:23:10.956  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-24 04:23:10.957  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-24 04:23:10.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-24 04:23:10.958 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-24 04:23:10.958 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-24 04:23:10.966 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-24 04:23:10.968 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:23:10.968 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:23:10.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:23:11.172  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-24 04:23:11.173  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-24 04:23:11.173 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-24 04:23:11.174 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:23:11.175  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-24 04:23:11.176  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-24 04:23:11.176 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:23:11.177 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:23:11.177 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:23:11.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:23:11.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:23:11.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:23:11.180 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:23:11.180 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:23:11.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:23:11.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-24 04:23:11.185 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492095192861852110478739907432134459182516260598 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 24 02:50:11 UTC 2022 Final Date: Tue Nov 23 02:50:10 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:b4:84:55:b9:6a:0d:f3:ab:e7:e4:11:02:d0:5a:a5:fc:f4:94:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8873262f1163be9b55bd02dc872ccaf3fe4b5789 c65c5ec1a99f2a3d1ed5656761da9a5289313f75 42115706fe4e450f940a8779c895b80baf7ef37d cb9a8414900569991b16d21c7eff63398ba4640f ae522e6ffeceaab79943bd1eb94df4db8814c552 b9016c6b13abc38fb16c0cddc8c60f022f97dc6b 0299012a4ede899ccb953137f10e0ef65f1854ee 8162c40779ec5fcbc9844e3b4336704cc4b69797 cf363b48df36894aba9f33a23adbfdedec59a013 3a46cc3e68131452be902f548db65487620e0f4e ee19f2e529a6869a72a5e78e3c96767f898da730 760c81dc06a950ab18e85d9049617815ad38d1a3 ddc4e638af7519af035dca703eafddafb6619f7c 1f996833dcc84be7cdf786932c86c5c0ffbb6729 0d7b5434c7e104d0a8633cc8a252b6b6e9904436 24ea4e377ad339b898e625813da7c7c03e07105a f22267c5011cec7f4fc0d3059e8ebc8497ea289b baf1c52248709367de45d1712188dc0340833fdc bfbb4dee8151efb8a8c24deceadb46886c72506c 060ff51c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:e9:e8:0d:db:ce:a5:8a:48:8b:c4:5c:18:61:87:fc:69:74:11:9f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-24 04:28:58.686  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-24 04:28:58.693 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-24 04:28:58.702 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-24 04:28:58.704 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-24 04:28:58.704  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-24 04:28:58.705  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-24 04:28:58.706  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-24 04:28:58.706 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-24 04:28:58.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-24 04:28:58.708 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-24 04:28:58.716 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-24 04:28:58.717 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:28:58.717 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:28:58.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:28:58.955  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-24 04:28:58.957  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-24 04:28:58.957 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-24 04:28:58.957 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:28:58.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-24 04:28:58.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-24 04:28:58.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:28:58.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:28:58.961 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:28:58.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:28:58.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:28:58.963 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:28:58.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:28:58.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:28:58.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:28:58.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-24 04:28:58.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492095192861852110478739907432134459182516260598 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 24 02:50:11 UTC 2022 Final Date: Tue Nov 23 02:50:10 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:b4:84:55:b9:6a:0d:f3:ab:e7:e4:11:02:d0:5a:a5:fc:f4:94:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8873262f1163be9b55bd02dc872ccaf3fe4b5789 c65c5ec1a99f2a3d1ed5656761da9a5289313f75 42115706fe4e450f940a8779c895b80baf7ef37d cb9a8414900569991b16d21c7eff63398ba4640f ae522e6ffeceaab79943bd1eb94df4db8814c552 b9016c6b13abc38fb16c0cddc8c60f022f97dc6b 0299012a4ede899ccb953137f10e0ef65f1854ee 8162c40779ec5fcbc9844e3b4336704cc4b69797 cf363b48df36894aba9f33a23adbfdedec59a013 3a46cc3e68131452be902f548db65487620e0f4e ee19f2e529a6869a72a5e78e3c96767f898da730 760c81dc06a950ab18e85d9049617815ad38d1a3 ddc4e638af7519af035dca703eafddafb6619f7c 1f996833dcc84be7cdf786932c86c5c0ffbb6729 0d7b5434c7e104d0a8633cc8a252b6b6e9904436 24ea4e377ad339b898e625813da7c7c03e07105a f22267c5011cec7f4fc0d3059e8ebc8497ea289b baf1c52248709367de45d1712188dc0340833fdc bfbb4dee8151efb8a8c24deceadb46886c72506c 060ff51c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:a7:76:3b:15:81:22:43:fe:25:69:df:7c:ae:22:b2:4a:80:8b:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-24 04:29:21.071  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-24 04:29:21.072 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-24 04:29:21.073 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-24 04:29:21.074 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-24 04:29:21.074  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-24 04:29:21.075  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-24 04:29:21.075  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-24 04:29:21.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-24 04:29:21.076 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-24 04:29:21.076 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-24 04:29:21.079 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-24 04:29:21.080 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:29:21.080 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:29:21.081 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:29:21.191  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-24 04:29:21.191  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-24 04:29:21.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-24 04:29:21.192 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:29:21.193  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-24 04:29:21.193  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-24 04:29:21.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:29:21.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:29:21.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:29:21.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:29:21.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:29:21.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:29:21.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:29:21.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:29:21.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:29:21.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-24 04:29:21.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492095192861852110478739907432134459182516260598 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 24 02:50:11 UTC 2022 Final Date: Tue Nov 23 02:50:10 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:b4:84:55:b9:6a:0d:f3:ab:e7:e4:11:02:d0:5a:a5:fc:f4:94:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8873262f1163be9b55bd02dc872ccaf3fe4b5789 c65c5ec1a99f2a3d1ed5656761da9a5289313f75 42115706fe4e450f940a8779c895b80baf7ef37d cb9a8414900569991b16d21c7eff63398ba4640f ae522e6ffeceaab79943bd1eb94df4db8814c552 b9016c6b13abc38fb16c0cddc8c60f022f97dc6b 0299012a4ede899ccb953137f10e0ef65f1854ee 8162c40779ec5fcbc9844e3b4336704cc4b69797 cf363b48df36894aba9f33a23adbfdedec59a013 3a46cc3e68131452be902f548db65487620e0f4e ee19f2e529a6869a72a5e78e3c96767f898da730 760c81dc06a950ab18e85d9049617815ad38d1a3 ddc4e638af7519af035dca703eafddafb6619f7c 1f996833dcc84be7cdf786932c86c5c0ffbb6729 0d7b5434c7e104d0a8633cc8a252b6b6e9904436 24ea4e377ad339b898e625813da7c7c03e07105a f22267c5011cec7f4fc0d3059e8ebc8497ea289b baf1c52248709367de45d1712188dc0340833fdc bfbb4dee8151efb8a8c24deceadb46886c72506c 060ff51c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2d:43:56:29:08:16:68:44:67:0c:bf:ec:8e:bb:7b:55:73:fb:3f:a3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-24 04:50:44.398  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-24 04:50:44.401 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-24 04:50:44.404 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-24 04:50:44.405 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-24 04:50:44.406  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-24 04:50:44.406  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-24 04:50:44.407  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-24 04:50:44.407 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-24 04:50:44.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-24 04:50:44.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-24 04:50:44.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-24 04:50:44.413 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:50:44.413 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:50:44.414 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:50:44.593  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-24 04:50:44.594  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-24 04:50:44.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-24 04:50:44.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:50:44.595  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-24 04:50:44.596  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-24 04:50:44.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:50:44.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:50:44.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:50:44.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:50:44.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:50:44.598 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:50:44.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:50:44.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:50:44.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:50:44.600 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-24 04:50:44.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492095192861852110478739907432134459182516260598 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 24 02:50:11 UTC 2022 Final Date: Tue Nov 23 02:50:10 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:b4:84:55:b9:6a:0d:f3:ab:e7:e4:11:02:d0:5a:a5:fc:f4:94:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8873262f1163be9b55bd02dc872ccaf3fe4b5789 c65c5ec1a99f2a3d1ed5656761da9a5289313f75 42115706fe4e450f940a8779c895b80baf7ef37d cb9a8414900569991b16d21c7eff63398ba4640f ae522e6ffeceaab79943bd1eb94df4db8814c552 b9016c6b13abc38fb16c0cddc8c60f022f97dc6b 0299012a4ede899ccb953137f10e0ef65f1854ee 8162c40779ec5fcbc9844e3b4336704cc4b69797 cf363b48df36894aba9f33a23adbfdedec59a013 3a46cc3e68131452be902f548db65487620e0f4e ee19f2e529a6869a72a5e78e3c96767f898da730 760c81dc06a950ab18e85d9049617815ad38d1a3 ddc4e638af7519af035dca703eafddafb6619f7c 1f996833dcc84be7cdf786932c86c5c0ffbb6729 0d7b5434c7e104d0a8633cc8a252b6b6e9904436 24ea4e377ad339b898e625813da7c7c03e07105a f22267c5011cec7f4fc0d3059e8ebc8497ea289b baf1c52248709367de45d1712188dc0340833fdc bfbb4dee8151efb8a8c24deceadb46886c72506c 060ff51c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bd:2f:97:bc:de:52:30:68:25:49:20:9b:4b:32:99:fe:de:d0:0e:4f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-24 04:50:49.133  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-24 04:50:49.134 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-24 04:50:49.135 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-24 04:50:49.135 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-24 04:50:49.135  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-24 04:50:49.136  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-24 04:50:49.136  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-24 04:50:49.136 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-24 04:50:49.137 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-24 04:50:49.137 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-24 04:50:49.140 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-24 04:50:49.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:50:49.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-24 04:50:49.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:50:49.262  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-24 04:50:49.263  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-24 04:50:49.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-24 04:50:49.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-24 04:50:49.264  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-24 04:50:49.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-24 04:50:49.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:50:49.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:50:49.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:50:49.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:50:49.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:50:49.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:50:49.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-24 04:50:49.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-24 04:50:49.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-24 04:50:49.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-24 04:50:49.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492095192861852110478739907432134459182516260598 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 24 02:50:11 UTC 2022 Final Date: Tue Nov 23 02:50:10 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ff:b4:84:55:b9:6a:0d:f3:ab:e7:e4:11:02:d0:5a:a5:fc:f4:94:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8873262f1163be9b55bd02dc872ccaf3fe4b5789 c65c5ec1a99f2a3d1ed5656761da9a5289313f75 42115706fe4e450f940a8779c895b80baf7ef37d cb9a8414900569991b16d21c7eff63398ba4640f ae522e6ffeceaab79943bd1eb94df4db8814c552 b9016c6b13abc38fb16c0cddc8c60f022f97dc6b 0299012a4ede899ccb953137f10e0ef65f1854ee 8162c40779ec5fcbc9844e3b4336704cc4b69797 cf363b48df36894aba9f33a23adbfdedec59a013 3a46cc3e68131452be902f548db65487620e0f4e ee19f2e529a6869a72a5e78e3c96767f898da730 760c81dc06a950ab18e85d9049617815ad38d1a3 ddc4e638af7519af035dca703eafddafb6619f7c 1f996833dcc84be7cdf786932c86c5c0ffbb6729 0d7b5434c7e104d0a8633cc8a252b6b6e9904436 24ea4e377ad339b898e625813da7c7c03e07105a f22267c5011cec7f4fc0d3059e8ebc8497ea289b baf1c52248709367de45d1712188dc0340833fdc bfbb4dee8151efb8a8c24deceadb46886c72506c 060ff51c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:0a:ba:9a:59:ec:86:80:0d:d5:5b:bf:e3:ba:6f:1a:87:7b:bd:d5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]