2022-09-13 04:57:56,512 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-09-13 04:57:57,302 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-09-13 04:57:57.876  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Sep 13, 2022 4:57:59 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Sep 13, 2022 4:57:59 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Sep 13, 2022 4:57:59 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Sep 13, 2022 4:57:59 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-09-13 04:57:59.690 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-09-13 04:57:59.856  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-09-13 04:57:59.964  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-09-13 04:58:00.475 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-09-13 04:58:00.477 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-09-13 04:58:00.479 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-09-13 04:58:00.481 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-09-13 04:58:00.514 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-09-13 04:58:00.518 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-09-13 04:58:00.606 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-09-13 04:58:01.049 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Sep 13, 2022 4:58:01 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-09-13 04:58:01.797  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 5.939 seconds (JVM running for 7.106) Sep 13, 2022 4:58:27 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-09-13 04:58:56.829  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-13 04:58:56.836 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-13 04:58:56.860 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-13 04:58:56.863 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-13 04:58:56.872  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-13 04:58:56.874  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-13 04:58:56.875  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-13 04:58:56.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-13 04:58:56.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 04:58:56.878 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-13 04:58:56.882 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-13 04:58:56.884 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-13 04:58:56.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-13 04:58:56.914 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 04:58:56.915 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 04:58:56.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 04:58:57.438  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-13 04:58:57.440  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-13 04:58:57.441 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-13 04:58:57.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 04:58:57.448  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-13 04:58:57.448  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-13 04:58:57.449 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 04:58:57.449 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 04:58:57.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 04:58:57.460 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 04:58:57.460 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 04:58:57.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 04:58:57.467 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 04:58:57.467 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 04:58:57.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 04:58:57.469 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-13 04:58:57.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108122998300956566951295636176594123907506810227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 13 04:56:27 UTC 2022 Final Date: Sun Sep 12 04:56:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:41:03:c9:3d:d8:70:89:a5:af:17:a7:61:53:eb:b3:4f:dc:fc:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07468a29f59f4be76782f6e9722620724306b670 d40b1d00d55404377fe38e5865a2da860852ab87 66b42f7fada1542abac7120cb6f618ca9e339738 4cf2b0fb0f332c8da1d1554544d4bf8dfda3fa7f afc1c0ac6084ad69816b2285fa389a0100ca424b 351b44f43129affc93f2fcee23f8e95dc788f26e 4017c21296b424ec5882cc10f9e9df0c6aa4808d 31d90e956ac30fcd2cceea97ca39b5f77d29281c 8b7f8118863ea0c08388931ea22ba9082389dec4 1755f8222a20bee731388a837d1ec75e8fca6167 e178959dc523fcd367684cfb948bf2c1f733eccf ccb618b7732737aab2e1181c74c05edebe15058b c158c1c4e6be669459a5a3d038560148576bb6d4 afa02f9e80cbd7cef786270ed6d787e29f925adb 61e2857c03026c072db64f49ffb14c538e5928a2 316be6dad7411016e8605fad2c773ba4a0c7976d e56833cbc8b111e547ac98f1fff98311605db4ba 8ac8803f6340a78146f0710c981321073a8ba5dd 5a9bb3ec9958afe23ba971881f1111e56b5c1b2c 40a53abf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:55:a2:1b:26:c1:d8:c7:da:9e:94:6e:73:56:80:2f:ea:c1:fd:59] modulus: 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 public exponent: 10001 ] 2022-09-13 08:31:44.706  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-13 08:31:44.710 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-13 08:31:44.717 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-13 08:31:44.719 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-13 08:31:44.719  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-13 08:31:44.720  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-13 08:31:44.721  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-13 08:31:44.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-13 08:31:44.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-13 08:31:44.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-13 08:31:44.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-13 08:31:44.732 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:31:44.733 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:31:44.733 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:31:45.170  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-13 08:31:45.171  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-13 08:31:45.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-13 08:31:45.172 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:31:45.175  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-13 08:31:45.175  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-13 08:31:45.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:31:45.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:31:45.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:31:45.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:31:45.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:31:45.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:31:45.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:31:45.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:31:45.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:31:45.181 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-13 08:31:45.185 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108122998300956566951295636176594123907506810227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 13 04:56:27 UTC 2022 Final Date: Sun Sep 12 04:56:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:41:03:c9:3d:d8:70:89:a5:af:17:a7:61:53:eb:b3:4f:dc:fc:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07468a29f59f4be76782f6e9722620724306b670 d40b1d00d55404377fe38e5865a2da860852ab87 66b42f7fada1542abac7120cb6f618ca9e339738 4cf2b0fb0f332c8da1d1554544d4bf8dfda3fa7f afc1c0ac6084ad69816b2285fa389a0100ca424b 351b44f43129affc93f2fcee23f8e95dc788f26e 4017c21296b424ec5882cc10f9e9df0c6aa4808d 31d90e956ac30fcd2cceea97ca39b5f77d29281c 8b7f8118863ea0c08388931ea22ba9082389dec4 1755f8222a20bee731388a837d1ec75e8fca6167 e178959dc523fcd367684cfb948bf2c1f733eccf ccb618b7732737aab2e1181c74c05edebe15058b c158c1c4e6be669459a5a3d038560148576bb6d4 afa02f9e80cbd7cef786270ed6d787e29f925adb 61e2857c03026c072db64f49ffb14c538e5928a2 316be6dad7411016e8605fad2c773ba4a0c7976d e56833cbc8b111e547ac98f1fff98311605db4ba 8ac8803f6340a78146f0710c981321073a8ba5dd 5a9bb3ec9958afe23ba971881f1111e56b5c1b2c 40a53abf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:0a:42:2e:56:e3:d9:eb:fd:fd:34:3b:d5:76:a5:69:0e:96:f9:d1] modulus: f0e46f421e4621a8db26e1d32124dcf30d81376fc02673def1f5ab938a7a441cff6aa970df830f1e413fc710b0090a47df4b12ec921097295663ef962fa2f1bf507acf3e3595e01bdee0adbe4767fe55fca23f5879b91f454a63de1ce7583a3f4504d456ce23b3f19b861c143a787ba89b77cb44782c30805c2bae79d565a615dbde28da61e54ca81f7ad890e4040b0ed3d8e0ac120410cc930eef03fa37caaeaf965e973b4c7ad2f05b45a0b04f62a9848dfbaaa2984751e6de9067b416da8ffb85e8433eaa4f1e5ba674119b6bdcb4e584e8b85248c7da914a2ae68abab8016f7555bb621558dadc062baa2aeec3329b6bb01c7e3b65a52b039dcef77e680b public exponent: 10001 ] 2022-09-13 08:33:21.645  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-13 08:33:21.647 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-13 08:33:21.649 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-13 08:33:21.651 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-13 08:33:21.652  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-13 08:33:21.652  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-13 08:33:21.653  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-13 08:33:21.653 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-13 08:33:21.654 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-13 08:33:21.654 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-13 08:33:21.664 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-13 08:33:21.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:33:21.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:33:21.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:33:21.885  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-13 08:33:21.886  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-13 08:33:21.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-13 08:33:21.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:33:21.888  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-13 08:33:21.889  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-13 08:33:21.889 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:33:21.889 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:33:21.889 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:33:21.890 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:33:21.890 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:33:21.891 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:33:21.891 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:33:21.891 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:33:21.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:33:21.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-13 08:33:21.896 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108122998300956566951295636176594123907506810227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 13 04:56:27 UTC 2022 Final Date: Sun Sep 12 04:56:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:41:03:c9:3d:d8:70:89:a5:af:17:a7:61:53:eb:b3:4f:dc:fc:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07468a29f59f4be76782f6e9722620724306b670 d40b1d00d55404377fe38e5865a2da860852ab87 66b42f7fada1542abac7120cb6f618ca9e339738 4cf2b0fb0f332c8da1d1554544d4bf8dfda3fa7f afc1c0ac6084ad69816b2285fa389a0100ca424b 351b44f43129affc93f2fcee23f8e95dc788f26e 4017c21296b424ec5882cc10f9e9df0c6aa4808d 31d90e956ac30fcd2cceea97ca39b5f77d29281c 8b7f8118863ea0c08388931ea22ba9082389dec4 1755f8222a20bee731388a837d1ec75e8fca6167 e178959dc523fcd367684cfb948bf2c1f733eccf ccb618b7732737aab2e1181c74c05edebe15058b c158c1c4e6be669459a5a3d038560148576bb6d4 afa02f9e80cbd7cef786270ed6d787e29f925adb 61e2857c03026c072db64f49ffb14c538e5928a2 316be6dad7411016e8605fad2c773ba4a0c7976d e56833cbc8b111e547ac98f1fff98311605db4ba 8ac8803f6340a78146f0710c981321073a8ba5dd 5a9bb3ec9958afe23ba971881f1111e56b5c1b2c 40a53abf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:19:d4:ef:68:5a:36:8f:d8:c2:7e:8c:f3:4c:05:71:3e:66:d6:71] modulus: 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 public exponent: 10001 ] 2022-09-13 08:34:42.262  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-13 08:34:42.265 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-13 08:34:42.267 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-13 08:34:42.268 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-13 08:34:42.268  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-13 08:34:42.269  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-13 08:34:42.269  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-13 08:34:42.269 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-13 08:34:42.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-13 08:34:42.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-13 08:34:42.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-13 08:34:42.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:34:42.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:34:42.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:34:42.584  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-13 08:34:42.586  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-13 08:34:42.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-13 08:34:42.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:34:42.589  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-13 08:34:42.590  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-13 08:34:42.591 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:34:42.591 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:34:42.592 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:34:42.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:34:42.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:34:42.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:34:42.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:34:42.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:34:42.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:34:42.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-13 08:34:42.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108122998300956566951295636176594123907506810227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 13 04:56:27 UTC 2022 Final Date: Sun Sep 12 04:56:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:41:03:c9:3d:d8:70:89:a5:af:17:a7:61:53:eb:b3:4f:dc:fc:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07468a29f59f4be76782f6e9722620724306b670 d40b1d00d55404377fe38e5865a2da860852ab87 66b42f7fada1542abac7120cb6f618ca9e339738 4cf2b0fb0f332c8da1d1554544d4bf8dfda3fa7f afc1c0ac6084ad69816b2285fa389a0100ca424b 351b44f43129affc93f2fcee23f8e95dc788f26e 4017c21296b424ec5882cc10f9e9df0c6aa4808d 31d90e956ac30fcd2cceea97ca39b5f77d29281c 8b7f8118863ea0c08388931ea22ba9082389dec4 1755f8222a20bee731388a837d1ec75e8fca6167 e178959dc523fcd367684cfb948bf2c1f733eccf ccb618b7732737aab2e1181c74c05edebe15058b c158c1c4e6be669459a5a3d038560148576bb6d4 afa02f9e80cbd7cef786270ed6d787e29f925adb 61e2857c03026c072db64f49ffb14c538e5928a2 316be6dad7411016e8605fad2c773ba4a0c7976d e56833cbc8b111e547ac98f1fff98311605db4ba 8ac8803f6340a78146f0710c981321073a8ba5dd 5a9bb3ec9958afe23ba971881f1111e56b5c1b2c 40a53abf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:48:6c:86:3e:57:67:2a:e0:d6:43:19:d1:a8:ee:76:0f:f9:ae:38] modulus: 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 public exponent: 10001 ] 2022-09-13 08:36:53.626  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-13 08:36:53.628 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-13 08:36:53.629 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-13 08:36:53.630 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-13 08:36:53.630  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-13 08:36:53.631  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-13 08:36:53.631  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-13 08:36:53.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-13 08:36:53.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-13 08:36:53.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-13 08:36:53.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-13 08:36:53.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:36:53.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:36:53.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:36:53.795  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-13 08:36:53.796  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-13 08:36:53.797 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-13 08:36:53.797 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:36:53.799  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-13 08:36:53.800  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-13 08:36:53.800 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:36:53.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:36:53.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:36:53.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:36:53.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:36:53.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:36:53.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:36:53.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:36:53.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:36:53.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-13 08:36:53.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108122998300956566951295636176594123907506810227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 13 04:56:27 UTC 2022 Final Date: Sun Sep 12 04:56:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:41:03:c9:3d:d8:70:89:a5:af:17:a7:61:53:eb:b3:4f:dc:fc:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07468a29f59f4be76782f6e9722620724306b670 d40b1d00d55404377fe38e5865a2da860852ab87 66b42f7fada1542abac7120cb6f618ca9e339738 4cf2b0fb0f332c8da1d1554544d4bf8dfda3fa7f afc1c0ac6084ad69816b2285fa389a0100ca424b 351b44f43129affc93f2fcee23f8e95dc788f26e 4017c21296b424ec5882cc10f9e9df0c6aa4808d 31d90e956ac30fcd2cceea97ca39b5f77d29281c 8b7f8118863ea0c08388931ea22ba9082389dec4 1755f8222a20bee731388a837d1ec75e8fca6167 e178959dc523fcd367684cfb948bf2c1f733eccf ccb618b7732737aab2e1181c74c05edebe15058b c158c1c4e6be669459a5a3d038560148576bb6d4 afa02f9e80cbd7cef786270ed6d787e29f925adb 61e2857c03026c072db64f49ffb14c538e5928a2 316be6dad7411016e8605fad2c773ba4a0c7976d e56833cbc8b111e547ac98f1fff98311605db4ba 8ac8803f6340a78146f0710c981321073a8ba5dd 5a9bb3ec9958afe23ba971881f1111e56b5c1b2c 40a53abf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:80:94:a4:59:4e:b9:b5:1a:33:43:84:24:d1:51:31:aa:ea:a4:75] modulus: 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 public exponent: 10001 ] 2022-09-13 08:43:20.547  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-13 08:43:20.556 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-13 08:43:20.560 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-13 08:43:20.562 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-13 08:43:20.562  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-13 08:43:20.562  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-13 08:43:20.563  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-13 08:43:20.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-13 08:43:20.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-13 08:43:20.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-13 08:43:20.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-13 08:43:20.571 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:43:20.572 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:43:20.572 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:43:22.160  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-13 08:43:22.161  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-13 08:43:22.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-13 08:43:22.162 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:43:22.165  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-13 08:43:22.165  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-13 08:43:22.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:43:22.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:43:22.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:43:22.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:43:22.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:43:22.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:43:22.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:43:22.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:43:22.169 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:43:22.169 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-13 08:43:22.173 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108122998300956566951295636176594123907506810227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 13 04:56:27 UTC 2022 Final Date: Sun Sep 12 04:56:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:41:03:c9:3d:d8:70:89:a5:af:17:a7:61:53:eb:b3:4f:dc:fc:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07468a29f59f4be76782f6e9722620724306b670 d40b1d00d55404377fe38e5865a2da860852ab87 66b42f7fada1542abac7120cb6f618ca9e339738 4cf2b0fb0f332c8da1d1554544d4bf8dfda3fa7f afc1c0ac6084ad69816b2285fa389a0100ca424b 351b44f43129affc93f2fcee23f8e95dc788f26e 4017c21296b424ec5882cc10f9e9df0c6aa4808d 31d90e956ac30fcd2cceea97ca39b5f77d29281c 8b7f8118863ea0c08388931ea22ba9082389dec4 1755f8222a20bee731388a837d1ec75e8fca6167 e178959dc523fcd367684cfb948bf2c1f733eccf ccb618b7732737aab2e1181c74c05edebe15058b c158c1c4e6be669459a5a3d038560148576bb6d4 afa02f9e80cbd7cef786270ed6d787e29f925adb 61e2857c03026c072db64f49ffb14c538e5928a2 316be6dad7411016e8605fad2c773ba4a0c7976d e56833cbc8b111e547ac98f1fff98311605db4ba 8ac8803f6340a78146f0710c981321073a8ba5dd 5a9bb3ec9958afe23ba971881f1111e56b5c1b2c 40a53abf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:cb:2f:9b:d1:56:73:51:e4:a1:77:8c:d3:3a:21:a5:d3:43:05:0e] modulus: a83dc876159023e59d2520e4b6a1cc1a5e217b33100f6d6279e6c943010be73d2ebfd0a8ee3f8c32c79dc58177b76eb37c5f615d00fb2c8e03842d75cdf9ee72c1c59f38d835ee8c1b51eb6bce0913058debc9158355a74dfa1a9b57fb0ed3d6f03a8f23cc70c31dd172c72fb39e232ad8bf8671e5f4ad37c7546d51d7232cbae022a7e1cd7b05a3bf2c5d593653de9972db43ee8ae871b53935a4d50a36816512fb0feaa8d02c4e9b8464be96bd32e201b698ed581b4b28761beefe078322d17e6ce873e5d7dafa409393b4a076c5a8fc5eca5e328a64dd2a56fac07587bfd2da9af761813f9243bbf5b856fc1aab7c9a8cf9f47575781135bc8357df4fa199 public exponent: 10001 ] 2022-09-13 08:48:21.000  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-13 08:48:21.003 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-13 08:48:21.005 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-13 08:48:21.006 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-13 08:48:21.006  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-13 08:48:21.006  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-13 08:48:21.007  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-13 08:48:21.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-13 08:48:21.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-13 08:48:21.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-13 08:48:21.011 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-13 08:48:21.012 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:48:21.012 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:48:21.012 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:48:21.237  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-13 08:48:21.238  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-13 08:48:21.239 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-13 08:48:21.239 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:48:21.242  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-13 08:48:21.243  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-13 08:48:21.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:48:21.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:48:21.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:48:21.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:48:21.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:48:21.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:48:21.248 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:48:21.248 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:48:21.248 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:48:21.249 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-13 08:48:21.252 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108122998300956566951295636176594123907506810227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 13 04:56:27 UTC 2022 Final Date: Sun Sep 12 04:56:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:41:03:c9:3d:d8:70:89:a5:af:17:a7:61:53:eb:b3:4f:dc:fc:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07468a29f59f4be76782f6e9722620724306b670 d40b1d00d55404377fe38e5865a2da860852ab87 66b42f7fada1542abac7120cb6f618ca9e339738 4cf2b0fb0f332c8da1d1554544d4bf8dfda3fa7f afc1c0ac6084ad69816b2285fa389a0100ca424b 351b44f43129affc93f2fcee23f8e95dc788f26e 4017c21296b424ec5882cc10f9e9df0c6aa4808d 31d90e956ac30fcd2cceea97ca39b5f77d29281c 8b7f8118863ea0c08388931ea22ba9082389dec4 1755f8222a20bee731388a837d1ec75e8fca6167 e178959dc523fcd367684cfb948bf2c1f733eccf ccb618b7732737aab2e1181c74c05edebe15058b c158c1c4e6be669459a5a3d038560148576bb6d4 afa02f9e80cbd7cef786270ed6d787e29f925adb 61e2857c03026c072db64f49ffb14c538e5928a2 316be6dad7411016e8605fad2c773ba4a0c7976d e56833cbc8b111e547ac98f1fff98311605db4ba 8ac8803f6340a78146f0710c981321073a8ba5dd 5a9bb3ec9958afe23ba971881f1111e56b5c1b2c 40a53abf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:15:1f:4b:43:de:fd:55:d2:04:d2:8e:6b:85:8b:dc:33:c7:99:00] modulus: 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 public exponent: 10001 ] 2022-09-13 08:48:36.349  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-13 08:48:36.350 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-13 08:48:36.351 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-13 08:48:36.352 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-13 08:48:36.352  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-13 08:48:36.353  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-13 08:48:36.353  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-13 08:48:36.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-13 08:48:36.354 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-13 08:48:36.354 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-13 08:48:36.359 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-13 08:48:36.359 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:48:36.360 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 08:48:36.360 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:48:36.481  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-13 08:48:36.481  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-13 08:48:36.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-13 08:48:36.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 08:48:36.483  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-13 08:48:36.484  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-13 08:48:36.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:48:36.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:48:36.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:48:36.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:48:36.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:48:36.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:48:36.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 08:48:36.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 08:48:36.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 08:48:36.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-13 08:48:36.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108122998300956566951295636176594123907506810227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 13 04:56:27 UTC 2022 Final Date: Sun Sep 12 04:56:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:41:03:c9:3d:d8:70:89:a5:af:17:a7:61:53:eb:b3:4f:dc:fc:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07468a29f59f4be76782f6e9722620724306b670 d40b1d00d55404377fe38e5865a2da860852ab87 66b42f7fada1542abac7120cb6f618ca9e339738 4cf2b0fb0f332c8da1d1554544d4bf8dfda3fa7f afc1c0ac6084ad69816b2285fa389a0100ca424b 351b44f43129affc93f2fcee23f8e95dc788f26e 4017c21296b424ec5882cc10f9e9df0c6aa4808d 31d90e956ac30fcd2cceea97ca39b5f77d29281c 8b7f8118863ea0c08388931ea22ba9082389dec4 1755f8222a20bee731388a837d1ec75e8fca6167 e178959dc523fcd367684cfb948bf2c1f733eccf ccb618b7732737aab2e1181c74c05edebe15058b c158c1c4e6be669459a5a3d038560148576bb6d4 afa02f9e80cbd7cef786270ed6d787e29f925adb 61e2857c03026c072db64f49ffb14c538e5928a2 316be6dad7411016e8605fad2c773ba4a0c7976d e56833cbc8b111e547ac98f1fff98311605db4ba 8ac8803f6340a78146f0710c981321073a8ba5dd 5a9bb3ec9958afe23ba971881f1111e56b5c1b2c 40a53abf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:df:d7:ca:79:b2:4c:13:6c:b0:3c:32:55:f8:bf:23:50:50:55:23] modulus: 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 public exponent: 10001 ] 2022-09-13 09:06:07.031  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-13 09:06:07.035 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-13 09:06:07.038 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-13 09:06:07.039 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-13 09:06:07.039  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-13 09:06:07.040  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-13 09:06:07.040  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-13 09:06:07.040 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-13 09:06:07.041 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-13 09:06:07.041 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-13 09:06:07.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-13 09:06:07.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 09:06:07.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 09:06:07.047 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 09:06:07.199  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-13 09:06:07.200  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-13 09:06:07.201 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-13 09:06:07.201 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 09:06:07.202  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-13 09:06:07.202  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-13 09:06:07.203 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 09:06:07.203 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 09:06:07.203 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 09:06:07.203 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 09:06:07.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 09:06:07.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 09:06:07.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 09:06:07.205 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 09:06:07.205 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 09:06:07.205 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-13 09:06:07.208 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108122998300956566951295636176594123907506810227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 13 04:56:27 UTC 2022 Final Date: Sun Sep 12 04:56:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:41:03:c9:3d:d8:70:89:a5:af:17:a7:61:53:eb:b3:4f:dc:fc:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07468a29f59f4be76782f6e9722620724306b670 d40b1d00d55404377fe38e5865a2da860852ab87 66b42f7fada1542abac7120cb6f618ca9e339738 4cf2b0fb0f332c8da1d1554544d4bf8dfda3fa7f afc1c0ac6084ad69816b2285fa389a0100ca424b 351b44f43129affc93f2fcee23f8e95dc788f26e 4017c21296b424ec5882cc10f9e9df0c6aa4808d 31d90e956ac30fcd2cceea97ca39b5f77d29281c 8b7f8118863ea0c08388931ea22ba9082389dec4 1755f8222a20bee731388a837d1ec75e8fca6167 e178959dc523fcd367684cfb948bf2c1f733eccf ccb618b7732737aab2e1181c74c05edebe15058b c158c1c4e6be669459a5a3d038560148576bb6d4 afa02f9e80cbd7cef786270ed6d787e29f925adb 61e2857c03026c072db64f49ffb14c538e5928a2 316be6dad7411016e8605fad2c773ba4a0c7976d e56833cbc8b111e547ac98f1fff98311605db4ba 8ac8803f6340a78146f0710c981321073a8ba5dd 5a9bb3ec9958afe23ba971881f1111e56b5c1b2c 40a53abf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:34:de:0b:a7:2e:3c:3f:20:f6:63:41:5d:f8:12:4b:52:83:1d:25] modulus: b92837a2a2d24431e69929d10af1f46433b1991aa01a55fdb87e03b8e6cf839d19b209e50b01cdad4f2c3a21f2b773afae8b8f52cad5db57f999337c77cd091c544404138260cd955c887574cd13e3a6c8d938f5e7e87c9ed3d1266da90af7e17ec36b2e81395a79d04200f8aa7f478f2989545891f786bf94d77f23832af1ba656eee96e8561af8f78abdca393cb7381ec80fb4a070eaeac97a058ce082ca34a2465ec2d6dba338279f3acfa208851a0a6e1bc89d1f86639ae3885290f01746d9d3d557507627a2fae02bf0c1ba3ec6f7afb8ce3eaeca6643d6712fadde87834b8f1c86395d11febed837a114f4382bc18ebc03c986f6db4b5505145cdf0f1d public exponent: 10001 ] 2022-09-13 09:06:16.975  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-13 09:06:16.976 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-13 09:06:16.978 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-13 09:06:16.978 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-13 09:06:16.979  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-13 09:06:16.979  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-13 09:06:16.980  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-13 09:06:16.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-13 09:06:16.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-13 09:06:16.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-13 09:06:16.985 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-13 09:06:16.986 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 09:06:16.986 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-13 09:06:16.986 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 09:06:17.143  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-13 09:06:17.147  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-13 09:06:17.147 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-13 09:06:17.147 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-13 09:06:17.149  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-13 09:06:17.151  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-13 09:06:17.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 09:06:17.153 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 09:06:17.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 09:06:17.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 09:06:17.154 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 09:06:17.155 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 09:06:17.155 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-13 09:06:17.155 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-13 09:06:17.155 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-13 09:06:17.156 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-13 09:06:17.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 108122998300956566951295636176594123907506810227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 13 04:56:27 UTC 2022 Final Date: Sun Sep 12 04:56:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:41:03:c9:3d:d8:70:89:a5:af:17:a7:61:53:eb:b3:4f:dc:fc:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07468a29f59f4be76782f6e9722620724306b670 d40b1d00d55404377fe38e5865a2da860852ab87 66b42f7fada1542abac7120cb6f618ca9e339738 4cf2b0fb0f332c8da1d1554544d4bf8dfda3fa7f afc1c0ac6084ad69816b2285fa389a0100ca424b 351b44f43129affc93f2fcee23f8e95dc788f26e 4017c21296b424ec5882cc10f9e9df0c6aa4808d 31d90e956ac30fcd2cceea97ca39b5f77d29281c 8b7f8118863ea0c08388931ea22ba9082389dec4 1755f8222a20bee731388a837d1ec75e8fca6167 e178959dc523fcd367684cfb948bf2c1f733eccf ccb618b7732737aab2e1181c74c05edebe15058b c158c1c4e6be669459a5a3d038560148576bb6d4 afa02f9e80cbd7cef786270ed6d787e29f925adb 61e2857c03026c072db64f49ffb14c538e5928a2 316be6dad7411016e8605fad2c773ba4a0c7976d e56833cbc8b111e547ac98f1fff98311605db4ba 8ac8803f6340a78146f0710c981321073a8ba5dd 5a9bb3ec9958afe23ba971881f1111e56b5c1b2c 40a53abf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:6c:fa:c4:99:5b:5f:be:24:f0:26:b7:11:2b:83:12:15:86:cd:1b] modulus: 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 public exponent: 10001 ]