2023-02-03 03:40:21,171 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-02-03 03:40:22,697 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-02-03 03:40:23.682  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Feb 03, 2023 3:40:26 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Feb 03, 2023 3:40:26 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Feb 03, 2023 3:40:26 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Feb 03, 2023 3:40:26 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-02-03 03:40:27.458 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-02-03 03:40:27.811  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2023-02-03 03:40:28.040  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-02-03 03:40:29.350 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-02-03 03:40:29.354 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-02-03 03:40:29.356 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-02-03 03:40:29.362 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-02-03 03:40:29.419 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-02-03 03:40:29.425 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2023-02-03 03:40:29.576 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2023-02-03 03:40:30.400 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Feb 03, 2023 3:40:31 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-02-03 03:40:31.987  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 12.249 seconds (JVM running for 44.89) Feb 03, 2023 3:40:41 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-02-03 06:45:33.924  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-03 06:45:33.942 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-03 06:45:34.012 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-03 06:45:34.020 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-03 06:45:34.052  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-03 06:45:34.056  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-03 06:45:34.058  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-03 06:45:34.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-03 06:45:34.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 06:45:34.066 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-03 06:45:34.492 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-03 06:45:34.502 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-03 06:45:34.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-03 06:45:34.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 06:45:34.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 06:45:34.614 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 06:45:35.482  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-03 06:45:35.486  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-03 06:45:35.487 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-03 06:45:35.489 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 06:45:35.501  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-03 06:45:35.502  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-03 06:45:35.503 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:45:35.503 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:45:35.504 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:45:35.541 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:45:35.542 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:45:35.542 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:45:35.551 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:45:35.551 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:45:35.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:45:35.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-03 06:45:35.613 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 517486261293835733862162821754903500073443370830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 03 03:17:28 UTC 2023 Final Date: Wed Feb 02 03:17:27 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:bf:4f:bc:38:66:14:63:b7:7b:0c:2a:44:8b:9d:eb:9f:07:c3:91],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 91a45ad050c664d1d9c008670fd9ae13efd20e9c ab81c904d730931266c4e61c3f65e7b6ba575f17 78a6c01d1d6d7138f30ac225d4ac7360dc75cc3f 600fc4f58ef50c2227c86bc0752199edb34b3560 b08b217027fc3a811be1af3b595933a20917ddc6 9bc4aedb6f7015c332ad810d63d9cfdc94a3ef2c 016deed32fc2b3f736c0f338611c48a5fe51c44e af68c24977d3e47ad92f07181a805da7ba9c9382 b8842d7037c1fa590a61634d329976158f167ccd 592a665cce519bcf0a58cd2ffc2196c270e79236 7a1d2f5a09767cdb85e7e891c787ebcba3550b77 ddf8f766629107760c733e81e53bd23e439d530d e85cdf0b76c41b5ba0da454b764e44d85e44c97f 12650f24a1fbfed6e4e3659f5bad39636d4ebd0c 55798878a7a82003ed269d6f687d1ee416bec36a 1e3c7ba3438f06c4b17e52aef9dea76df72a96b9 f831d6cd88df099ee016f60a553d3b6fcce1f5ae 3f92a12b9d8881186671d7850e85c341304b5d7e 94f03aef34b9c96c7b530fb99df32bb1094d6d45 aea86a3e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:8a:df:3d:c1:1d:b6:a7:64:09:5c:60:1a:55:83:d6:71:d9:72:23],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-03 06:47:22.074  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-03 06:47:22.076 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-03 06:47:22.079 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-03 06:47:22.080 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-03 06:47:22.081  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-03 06:47:22.082  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-03 06:47:22.083  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-03 06:47:22.083 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-03 06:47:22.084 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-03 06:47:22.085 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-03 06:47:22.092 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-03 06:47:22.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 06:47:22.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 06:47:22.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 06:47:22.257  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-03 06:47:22.258  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-03 06:47:22.259 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-03 06:47:22.260 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 06:47:22.264  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-03 06:47:22.265  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-03 06:47:22.266 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:47:22.267 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:47:22.267 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:47:22.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:47:22.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:47:22.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:47:22.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:47:22.272 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:47:22.272 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:47:22.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-03 06:47:22.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 517486261293835733862162821754903500073443370830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 03 03:17:28 UTC 2023 Final Date: Wed Feb 02 03:17:27 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:bf:4f:bc:38:66:14:63:b7:7b:0c:2a:44:8b:9d:eb:9f:07:c3:91],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 91a45ad050c664d1d9c008670fd9ae13efd20e9c ab81c904d730931266c4e61c3f65e7b6ba575f17 78a6c01d1d6d7138f30ac225d4ac7360dc75cc3f 600fc4f58ef50c2227c86bc0752199edb34b3560 b08b217027fc3a811be1af3b595933a20917ddc6 9bc4aedb6f7015c332ad810d63d9cfdc94a3ef2c 016deed32fc2b3f736c0f338611c48a5fe51c44e af68c24977d3e47ad92f07181a805da7ba9c9382 b8842d7037c1fa590a61634d329976158f167ccd 592a665cce519bcf0a58cd2ffc2196c270e79236 7a1d2f5a09767cdb85e7e891c787ebcba3550b77 ddf8f766629107760c733e81e53bd23e439d530d e85cdf0b76c41b5ba0da454b764e44d85e44c97f 12650f24a1fbfed6e4e3659f5bad39636d4ebd0c 55798878a7a82003ed269d6f687d1ee416bec36a 1e3c7ba3438f06c4b17e52aef9dea76df72a96b9 f831d6cd88df099ee016f60a553d3b6fcce1f5ae 3f92a12b9d8881186671d7850e85c341304b5d7e 94f03aef34b9c96c7b530fb99df32bb1094d6d45 aea86a3e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:35:c2:9c:92:1f:59:59:3a:c2:5d:20:34:c4:51:e7:33:1d:2c:23],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-03 06:49:03.364  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-03 06:49:03.369 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-03 06:49:03.372 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-03 06:49:03.374 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-03 06:49:03.375  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-03 06:49:03.376  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-03 06:49:03.377  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-03 06:49:03.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-03 06:49:03.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-03 06:49:03.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-03 06:49:03.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-03 06:49:03.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 06:49:03.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 06:49:03.388 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 06:49:03.540  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-03 06:49:03.541  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-03 06:49:03.542 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-03 06:49:03.542 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 06:49:03.548  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-03 06:49:03.549  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-03 06:49:03.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:49:03.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:49:03.551 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:49:03.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:49:03.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:49:03.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:49:03.561 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:49:03.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:49:03.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:49:03.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-03 06:49:03.572 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 517486261293835733862162821754903500073443370830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 03 03:17:28 UTC 2023 Final Date: Wed Feb 02 03:17:27 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:bf:4f:bc:38:66:14:63:b7:7b:0c:2a:44:8b:9d:eb:9f:07:c3:91],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 91a45ad050c664d1d9c008670fd9ae13efd20e9c ab81c904d730931266c4e61c3f65e7b6ba575f17 78a6c01d1d6d7138f30ac225d4ac7360dc75cc3f 600fc4f58ef50c2227c86bc0752199edb34b3560 b08b217027fc3a811be1af3b595933a20917ddc6 9bc4aedb6f7015c332ad810d63d9cfdc94a3ef2c 016deed32fc2b3f736c0f338611c48a5fe51c44e af68c24977d3e47ad92f07181a805da7ba9c9382 b8842d7037c1fa590a61634d329976158f167ccd 592a665cce519bcf0a58cd2ffc2196c270e79236 7a1d2f5a09767cdb85e7e891c787ebcba3550b77 ddf8f766629107760c733e81e53bd23e439d530d e85cdf0b76c41b5ba0da454b764e44d85e44c97f 12650f24a1fbfed6e4e3659f5bad39636d4ebd0c 55798878a7a82003ed269d6f687d1ee416bec36a 1e3c7ba3438f06c4b17e52aef9dea76df72a96b9 f831d6cd88df099ee016f60a553d3b6fcce1f5ae 3f92a12b9d8881186671d7850e85c341304b5d7e 94f03aef34b9c96c7b530fb99df32bb1094d6d45 aea86a3e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:4f:f7:23:d3:3f:a0:2b:6b:8a:cb:0d:14:ac:4b:28:70:51:f7:0d],[56:66:d1:a4] modulus: ddbde14353e4f37d7db074267124f42e41774fca21434eb4ee79e419a2b3dcbdaa0506fed94611d5269bf0f42094e9949d584b698e10df457fe3ea7c87ba1d78c460db4ecdf34ff79f125877a42e985a07160eac2ab912e9242835682a8f57eb47a34523e3a75be3c169b7456990a9da59d07e35dbe2fc01a7174c5269510e2211acf30304cd6ec9e668a30ea674c14d83da55a67820fb7656a4781a9dcd0aaf18de4680544a6a4eda42f71e4d9268c62ea96a72e64c7f5dd7f1a6f8d9d879efffeca883dad4c9f6a74b82ad55ae12f25566f0a0dc3bbd4abccf5fb2b7e7b7db1555f0193cb403f6bda6babf0a871f0ae65286073e51b834b99dc2478e50c99f public exponent: 10001 ] 2023-02-03 06:51:36.012  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-03 06:51:36.015 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-03 06:51:36.018 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-03 06:51:36.025 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-03 06:51:36.026  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-03 06:51:36.027  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-03 06:51:36.028  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-03 06:51:36.029 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-03 06:51:36.030 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-03 06:51:36.031 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-03 06:51:36.038 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-03 06:51:36.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 06:51:36.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 06:51:36.041 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 06:51:36.205  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-03 06:51:36.207  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-03 06:51:36.207 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-03 06:51:36.214 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 06:51:36.216  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-03 06:51:36.217  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-03 06:51:36.218 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:51:36.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:51:36.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:51:36.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:51:36.232 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:51:36.233 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:51:36.235 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:51:36.235 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:51:36.236 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:51:36.237 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-03 06:51:36.246 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 517486261293835733862162821754903500073443370830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 03 03:17:28 UTC 2023 Final Date: Wed Feb 02 03:17:27 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:bf:4f:bc:38:66:14:63:b7:7b:0c:2a:44:8b:9d:eb:9f:07:c3:91],[56:66:d1:a4] modulus: b95fcb58fa81eeec22de180abccba22d8740de78f9893dcc53405bb5271895035fd91a2f9ca2657750ec2ff4a8383c823d939fad52ddcf63bff40398c95f5ce79c2573e11263e9c52bdee9e2fb59472e0e31e5e30fb4d17c9357ec0089a5fee5579b17e3e1d3303fb475b475448b1a52e805991a77095056e28f9621e3e462754b4a84812b6296a0094125f78940488f0a1cd60a0d3f8291ad8a29c40261932d68acea3367afed55da12c705788c674bd07097b8da25073c055632728139deb8104267589edea00028094a535210a175ae156789df1a7e7735bfe457a41dbc36cc07e2ffdfcee7632017de1a25d5f6cbcefdec79f650e915dd7633ffdb689224305a60708b6e22a1c20f940950a4d3ddc577fa23a8234b2bf7c61fcb5e9e20c005a5039281e306eb2e1cb311b1ba071d7fb1406dff0cabd9f8be9237a20de4dab78cfec5d3d6eb46dea72da4f07f16c2c2d2ac13064926ffc47bd45b80e8bd6fb108e6296c3085a414f3bed2558a11506c66cf9b3a6780371c5bc623d5f33bfd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 91a45ad050c664d1d9c008670fd9ae13efd20e9c ab81c904d730931266c4e61c3f65e7b6ba575f17 78a6c01d1d6d7138f30ac225d4ac7360dc75cc3f 600fc4f58ef50c2227c86bc0752199edb34b3560 b08b217027fc3a811be1af3b595933a20917ddc6 9bc4aedb6f7015c332ad810d63d9cfdc94a3ef2c 016deed32fc2b3f736c0f338611c48a5fe51c44e af68c24977d3e47ad92f07181a805da7ba9c9382 b8842d7037c1fa590a61634d329976158f167ccd 592a665cce519bcf0a58cd2ffc2196c270e79236 7a1d2f5a09767cdb85e7e891c787ebcba3550b77 ddf8f766629107760c733e81e53bd23e439d530d e85cdf0b76c41b5ba0da454b764e44d85e44c97f 12650f24a1fbfed6e4e3659f5bad39636d4ebd0c 55798878a7a82003ed269d6f687d1ee416bec36a 1e3c7ba3438f06c4b17e52aef9dea76df72a96b9 f831d6cd88df099ee016f60a553d3b6fcce1f5ae 3f92a12b9d8881186671d7850e85c341304b5d7e 94f03aef34b9c96c7b530fb99df32bb1094d6d45 aea86a3e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:0b:0b:f9:aa:ca:36:40:c0:16:10:90:bb:c5:7d:9d:e9:84:3f:e0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-03 06:59:51.507  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-03 06:59:51.515 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-03 06:59:51.522 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-02-03 06:59:51.543 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-03 06:59:51.545  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-02-03 06:59:51.547  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-03 06:59:51.554  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-03 06:59:51.556 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-03 06:59:51.558 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-03 06:59:51.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-03 06:59:51.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-03 06:59:51.572 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 06:59:51.572 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 06:59:51.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 06:59:51.744  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-03 06:59:51.750  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-03 06:59:51.753 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-03 06:59:51.753 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 06:59:51.756  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-03 06:59:51.756  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-03 06:59:51.758 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:59:51.759 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:59:51.766 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:59:51.768 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:59:51.768 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:59:51.774 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:59:51.775 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 06:59:51.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 06:59:51.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 06:59:51.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-03 06:59:51.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 517486261293835733862162821754903500073443370830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 03 03:17:28 UTC 2023 Final Date: Wed Feb 02 03:17:27 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:bf:4f:bc:38:66:14:63:b7:7b:0c:2a:44:8b:9d:eb:9f:07:c3:91],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 91a45ad050c664d1d9c008670fd9ae13efd20e9c ab81c904d730931266c4e61c3f65e7b6ba575f17 78a6c01d1d6d7138f30ac225d4ac7360dc75cc3f 600fc4f58ef50c2227c86bc0752199edb34b3560 b08b217027fc3a811be1af3b595933a20917ddc6 9bc4aedb6f7015c332ad810d63d9cfdc94a3ef2c 016deed32fc2b3f736c0f338611c48a5fe51c44e af68c24977d3e47ad92f07181a805da7ba9c9382 b8842d7037c1fa590a61634d329976158f167ccd 592a665cce519bcf0a58cd2ffc2196c270e79236 7a1d2f5a09767cdb85e7e891c787ebcba3550b77 ddf8f766629107760c733e81e53bd23e439d530d e85cdf0b76c41b5ba0da454b764e44d85e44c97f 12650f24a1fbfed6e4e3659f5bad39636d4ebd0c 55798878a7a82003ed269d6f687d1ee416bec36a 1e3c7ba3438f06c4b17e52aef9dea76df72a96b9 f831d6cd88df099ee016f60a553d3b6fcce1f5ae 3f92a12b9d8881186671d7850e85c341304b5d7e 94f03aef34b9c96c7b530fb99df32bb1094d6d45 aea86a3e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:23:62:7b:f1:ca:24:ab:ad:5e:ce:6f:4c:44:ee:6a:2f:f4:1b:0c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-03 07:05:31.434  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-03 07:05:31.439 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-03 07:05:31.442 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-02-03 07:05:31.443 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-03 07:05:31.444  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-02-03 07:05:31.445  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-03 07:05:31.445  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-03 07:05:31.445 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-03 07:05:31.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-03 07:05:31.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-03 07:05:31.455 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-03 07:05:31.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 07:05:31.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 07:05:31.458 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 07:05:31.664  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-03 07:05:31.665  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-03 07:05:31.666 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-03 07:05:31.666 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 07:05:31.668  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-03 07:05:31.669  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-03 07:05:31.672 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 07:05:31.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 07:05:31.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 07:05:31.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 07:05:31.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 07:05:31.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 07:05:31.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 07:05:31.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 07:05:31.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 07:05:31.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-03 07:05:31.684 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 517486261293835733862162821754903500073443370830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 03 03:17:28 UTC 2023 Final Date: Wed Feb 02 03:17:27 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:bf:4f:bc:38:66:14:63:b7:7b:0c:2a:44:8b:9d:eb:9f:07:c3:91],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 91a45ad050c664d1d9c008670fd9ae13efd20e9c ab81c904d730931266c4e61c3f65e7b6ba575f17 78a6c01d1d6d7138f30ac225d4ac7360dc75cc3f 600fc4f58ef50c2227c86bc0752199edb34b3560 b08b217027fc3a811be1af3b595933a20917ddc6 9bc4aedb6f7015c332ad810d63d9cfdc94a3ef2c 016deed32fc2b3f736c0f338611c48a5fe51c44e af68c24977d3e47ad92f07181a805da7ba9c9382 b8842d7037c1fa590a61634d329976158f167ccd 592a665cce519bcf0a58cd2ffc2196c270e79236 7a1d2f5a09767cdb85e7e891c787ebcba3550b77 ddf8f766629107760c733e81e53bd23e439d530d e85cdf0b76c41b5ba0da454b764e44d85e44c97f 12650f24a1fbfed6e4e3659f5bad39636d4ebd0c 55798878a7a82003ed269d6f687d1ee416bec36a 1e3c7ba3438f06c4b17e52aef9dea76df72a96b9 f831d6cd88df099ee016f60a553d3b6fcce1f5ae 3f92a12b9d8881186671d7850e85c341304b5d7e 94f03aef34b9c96c7b530fb99df32bb1094d6d45 aea86a3e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:43:e3:48:3e:56:b9:81:75:68:aa:e6:c6:e5:fc:f2:0e:9d:79:28],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-03 07:05:52.840  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-03 07:05:52.845 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-03 07:05:52.856 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-02-03 07:05:52.858 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-03 07:05:52.860  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-02-03 07:05:52.860  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-03 07:05:52.861  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-03 07:05:52.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-03 07:05:52.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-03 07:05:52.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-03 07:05:52.869 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-03 07:05:52.870 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 07:05:52.870 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 07:05:52.871 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 07:05:53.023  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-03 07:05:53.024  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-03 07:05:53.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-03 07:05:53.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 07:05:53.028  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-03 07:05:53.028  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-03 07:05:53.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 07:05:53.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 07:05:53.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 07:05:53.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 07:05:53.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 07:05:53.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 07:05:53.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 07:05:53.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 07:05:53.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 07:05:53.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-03 07:05:53.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 517486261293835733862162821754903500073443370830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 03 03:17:28 UTC 2023 Final Date: Wed Feb 02 03:17:27 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:bf:4f:bc:38:66:14:63:b7:7b:0c:2a:44:8b:9d:eb:9f:07:c3:91],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 91a45ad050c664d1d9c008670fd9ae13efd20e9c ab81c904d730931266c4e61c3f65e7b6ba575f17 78a6c01d1d6d7138f30ac225d4ac7360dc75cc3f 600fc4f58ef50c2227c86bc0752199edb34b3560 b08b217027fc3a811be1af3b595933a20917ddc6 9bc4aedb6f7015c332ad810d63d9cfdc94a3ef2c 016deed32fc2b3f736c0f338611c48a5fe51c44e af68c24977d3e47ad92f07181a805da7ba9c9382 b8842d7037c1fa590a61634d329976158f167ccd 592a665cce519bcf0a58cd2ffc2196c270e79236 7a1d2f5a09767cdb85e7e891c787ebcba3550b77 ddf8f766629107760c733e81e53bd23e439d530d e85cdf0b76c41b5ba0da454b764e44d85e44c97f 12650f24a1fbfed6e4e3659f5bad39636d4ebd0c 55798878a7a82003ed269d6f687d1ee416bec36a 1e3c7ba3438f06c4b17e52aef9dea76df72a96b9 f831d6cd88df099ee016f60a553d3b6fcce1f5ae 3f92a12b9d8881186671d7850e85c341304b5d7e 94f03aef34b9c96c7b530fb99df32bb1094d6d45 aea86a3e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:eb:b1:bd:c4:53:b2:54:18:9b:75:f8:ed:5f:d5:84:1b:ca:37:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-03 08:01:36.124  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-03 08:01:36.129 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-03 08:01:36.132 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-02-03 08:01:36.134 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-03 08:01:36.134  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-02-03 08:01:36.135  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-03 08:01:36.136  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-03 08:01:36.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-03 08:01:36.137 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-03 08:01:36.138 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-03 08:01:36.142 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-03 08:01:36.144 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 08:01:36.144 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 08:01:36.145 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 08:01:36.297  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-03 08:01:36.298  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-03 08:01:36.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-03 08:01:36.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 08:01:36.301  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-03 08:01:36.301  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-03 08:01:36.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 08:01:36.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 08:01:36.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 08:01:36.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 08:01:36.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 08:01:36.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 08:01:36.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 08:01:36.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 08:01:36.306 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 08:01:36.306 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-03 08:01:36.312 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 517486261293835733862162821754903500073443370830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 03 03:17:28 UTC 2023 Final Date: Wed Feb 02 03:17:27 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:bf:4f:bc:38:66:14:63:b7:7b:0c:2a:44:8b:9d:eb:9f:07:c3:91],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 91a45ad050c664d1d9c008670fd9ae13efd20e9c ab81c904d730931266c4e61c3f65e7b6ba575f17 78a6c01d1d6d7138f30ac225d4ac7360dc75cc3f 600fc4f58ef50c2227c86bc0752199edb34b3560 b08b217027fc3a811be1af3b595933a20917ddc6 9bc4aedb6f7015c332ad810d63d9cfdc94a3ef2c 016deed32fc2b3f736c0f338611c48a5fe51c44e af68c24977d3e47ad92f07181a805da7ba9c9382 b8842d7037c1fa590a61634d329976158f167ccd 592a665cce519bcf0a58cd2ffc2196c270e79236 7a1d2f5a09767cdb85e7e891c787ebcba3550b77 ddf8f766629107760c733e81e53bd23e439d530d e85cdf0b76c41b5ba0da454b764e44d85e44c97f 12650f24a1fbfed6e4e3659f5bad39636d4ebd0c 55798878a7a82003ed269d6f687d1ee416bec36a 1e3c7ba3438f06c4b17e52aef9dea76df72a96b9 f831d6cd88df099ee016f60a553d3b6fcce1f5ae 3f92a12b9d8881186671d7850e85c341304b5d7e 94f03aef34b9c96c7b530fb99df32bb1094d6d45 aea86a3e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:3f:fe:40:3a:34:01:09:f0:be:bb:c0:9f:2f:d0:f9:f7:d6:a9:fa],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-03 08:01:40.784  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-03 08:01:40.786 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-03 08:01:40.787 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-02-03 08:01:40.788 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-03 08:01:40.788  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-02-03 08:01:40.789  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-03 08:01:40.789  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-03 08:01:40.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-03 08:01:40.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-03 08:01:40.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-03 08:01:40.795 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-03 08:01:40.796 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 08:01:40.796 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-03 08:01:40.797 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 08:01:40.882  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-03 08:01:40.882  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-03 08:01:40.883 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-03 08:01:40.883 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-03 08:01:40.884  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-03 08:01:40.885  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-03 08:01:40.885 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 08:01:40.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 08:01:40.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 08:01:40.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 08:01:40.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 08:01:40.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 08:01:40.888 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-03 08:01:40.889 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-03 08:01:40.889 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-03 08:01:40.890 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-03 08:01:40.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 517486261293835733862162821754903500073443370830 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 03 03:17:28 UTC 2023 Final Date: Wed Feb 02 03:17:27 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:bf:4f:bc:38:66:14:63:b7:7b:0c:2a:44:8b:9d:eb:9f:07:c3:91],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 91a45ad050c664d1d9c008670fd9ae13efd20e9c ab81c904d730931266c4e61c3f65e7b6ba575f17 78a6c01d1d6d7138f30ac225d4ac7360dc75cc3f 600fc4f58ef50c2227c86bc0752199edb34b3560 b08b217027fc3a811be1af3b595933a20917ddc6 9bc4aedb6f7015c332ad810d63d9cfdc94a3ef2c 016deed32fc2b3f736c0f338611c48a5fe51c44e af68c24977d3e47ad92f07181a805da7ba9c9382 b8842d7037c1fa590a61634d329976158f167ccd 592a665cce519bcf0a58cd2ffc2196c270e79236 7a1d2f5a09767cdb85e7e891c787ebcba3550b77 ddf8f766629107760c733e81e53bd23e439d530d e85cdf0b76c41b5ba0da454b764e44d85e44c97f 12650f24a1fbfed6e4e3659f5bad39636d4ebd0c 55798878a7a82003ed269d6f687d1ee416bec36a 1e3c7ba3438f06c4b17e52aef9dea76df72a96b9 f831d6cd88df099ee016f60a553d3b6fcce1f5ae 3f92a12b9d8881186671d7850e85c341304b5d7e 94f03aef34b9c96c7b530fb99df32bb1094d6d45 aea86a3e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:fa:2d:3f:f6:03:28:26:56:fa:47:81:3d:65:b5:ce:e5:d1:ec:78],[56:66:d1:a4] modulus: c0ced9ad1e50cdfe08d7eb18e02a6bac3344bc4d8a8b206485c25e0ef2adbbb72556024b57fdaa64051ba8f311a23f411857f9fbf7c545007ba4e3ee7dc8192a06c37251349d66e15b987665d35fb3571cb9e1e017b8960d4fd42f9229b379efbb9829c0e50b464f9e26ca2efcd0cc690c73ac3f4a4e95203b944e790474d1f9909601d6e6f5c3dc1491def71675ce8fa007bcdb753c41fe93424f67c304ce8c3adb587e4b878b155ee3449e7bdd8326960fd107ebd9e97814e1257fdf7d1f7c421804e421c4e52c2dff03267c54678589328a7e5bdcef29ef369307af6af3267653c3764ab6604825d609ec73126d85747e5adba08c9405e9b88b176167bcbf public exponent: 10001 ]