2022-10-12 04:50:45,811 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-12 04:50:48,638 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-12 04:50:50.008  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Oct 12, 2022 4:50:56 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 12, 2022 4:50:56 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 12, 2022 4:50:56 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 12, 2022 4:50:57 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-12 04:50:59.359 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-12 04:51:00.061  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-10-12 04:51:00.521  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-12 04:51:02.541 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-12 04:51:02.548 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-10-12 04:51:02.556 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-12 04:51:02.564 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-12 04:51:02.657 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-10-12 04:51:02.663 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-10-12 04:51:02.954 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-10-12 04:51:04.833 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 12, 2022 4:51:06 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-12 04:51:07.180  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 24.019 seconds (JVM running for 28.547) Oct 12, 2022 4:51:09 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-12 04:51:43.400  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-12 04:51:43.428 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-12 04:51:43.605 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-12 04:51:43.612 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-12 04:51:43.672  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-12 04:51:43.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-12 04:51:43.679  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-12 04:51:43.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-12 04:51:43.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 04:51:43.691 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-12 04:51:43.718 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-12 04:51:43.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-12 04:51:44.037 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-12 04:51:44.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 04:51:44.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 04:51:44.085 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 04:51:45.183  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-12 04:51:45.208  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-12 04:51:45.209 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-12 04:51:45.243 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 04:51:45.288  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-12 04:51:45.296  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-12 04:51:45.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 04:51:45.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 04:51:45.311 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 04:51:45.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 04:51:45.360 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 04:51:45.360 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 04:51:45.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 04:51:45.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 04:51:45.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 04:51:45.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-12 04:51:45.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380439817570493064171942754494616546398733413416 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 12 04:46:50 UTC 2022 Final Date: Mon Oct 11 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:fd:40:4b:46:5a:4f:db:7c:0a:01:fa:90:c7:f2:2a:bc:26:77:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 63a2e5a44656b7e7b4ed2563276dafeddb9c37cf c854b3f2d0eb0b89c740c8a3db5c40c9d37af226 9b228ccffc171a247b65ae206d1b192d9aa25303 ea3042e973b236076a119a37db623162a97395a9 4dfa76af2c188e776c8db03a5582a50387af224d ae84f1a4088dd23da3c6fdcfeb505d0bc308408e 1bddfa1883deebc67f56ec34267a29003f2f6457 07eb93dcb73c4fff039b0899c7fe1c09c8195a3f c57a7efdc1fd7793ba4b8647c53c43ad6d8ace5c 412b8b10ad1cfd6c42af2d4827070ecd1289bcce 7a838b43c0ff379acaba12aeb9eaddce62a60ef5 fcd814359b2d80f8fd801b5a2857fec7687be938 84e3f8aa641b84098bc09d4216056edc4daeec9b a9f02c49966264175c8993ae28caec12b1793002 dbf9979edbd7aa284f85c45ba16badc1288468c8 8f79fd7f02ea22779b1e6cb50b92997a80f3c4ef 946b4e3e815e5e8cf030b83454d145000573ccfe a1ece263ac53458044f1d910feb03d75e78dd90e e573ec09ed3e84fbea9e977c00c98ff34e236b1e 238c0464 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:75:d9:22:98:7c:e1:55:ac:70:a9:b3:d0:9e:49:15:bc:67:97:ca],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-12 05:57:46.888  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-12 05:57:46.895 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-12 05:57:46.900 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-12 05:57:46.902 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-12 05:57:46.903  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-12 05:57:46.906  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-12 05:57:46.908  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-12 05:57:46.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-12 05:57:46.910 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-12 05:57:46.910 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-12 05:57:46.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-12 05:57:46.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 05:57:46.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 05:57:46.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 05:57:47.177  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-12 05:57:47.179  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-12 05:57:47.179 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-12 05:57:47.180 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 05:57:47.187  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-12 05:57:47.191  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-12 05:57:47.194 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 05:57:47.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 05:57:47.199 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 05:57:47.205 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 05:57:47.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 05:57:47.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 05:57:47.208 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 05:57:47.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 05:57:47.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 05:57:47.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-12 05:57:47.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380439817570493064171942754494616546398733413416 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 12 04:46:50 UTC 2022 Final Date: Mon Oct 11 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:fd:40:4b:46:5a:4f:db:7c:0a:01:fa:90:c7:f2:2a:bc:26:77:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 63a2e5a44656b7e7b4ed2563276dafeddb9c37cf c854b3f2d0eb0b89c740c8a3db5c40c9d37af226 9b228ccffc171a247b65ae206d1b192d9aa25303 ea3042e973b236076a119a37db623162a97395a9 4dfa76af2c188e776c8db03a5582a50387af224d ae84f1a4088dd23da3c6fdcfeb505d0bc308408e 1bddfa1883deebc67f56ec34267a29003f2f6457 07eb93dcb73c4fff039b0899c7fe1c09c8195a3f c57a7efdc1fd7793ba4b8647c53c43ad6d8ace5c 412b8b10ad1cfd6c42af2d4827070ecd1289bcce 7a838b43c0ff379acaba12aeb9eaddce62a60ef5 fcd814359b2d80f8fd801b5a2857fec7687be938 84e3f8aa641b84098bc09d4216056edc4daeec9b a9f02c49966264175c8993ae28caec12b1793002 dbf9979edbd7aa284f85c45ba16badc1288468c8 8f79fd7f02ea22779b1e6cb50b92997a80f3c4ef 946b4e3e815e5e8cf030b83454d145000573ccfe a1ece263ac53458044f1d910feb03d75e78dd90e e573ec09ed3e84fbea9e977c00c98ff34e236b1e 238c0464 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:cc:0e:ae:8c:98:f3:48:f6:77:2a:da:51:b5:28:1b:08:ba:61:21],[56:66:d1:a4] modulus: aa3cf62cda469641bbf439c06834ef082d53a88d64e9684a30de1303223dd7b9d7f3bb5037fd7e2a665e391746b1d35061692b6089697e8b9c98fb943812a78f4896a8340ad3b02473a39777e25b2208a60ec7cfbacb278617d861d14793fa4d3d493b3c84ac1a7b3ce0407335fab4b88a6c20e01ac993975a230df08cdb2be644b4df3b6f2b63c2fa4ea51e432eb3812ae250e7bc7fe7768216795f40fe0445dcb60c702d75c4d2555170021c980c49920d403a23c7c7ecda137a699e7b3ab9765041e497aab57ca8fe023df0ea79940dc98472710aacf5bb0623902c4fabddd9e290a54dfec3a59e27fb1188959c8fc9944a9076edaea966618fbda9bd870f public exponent: 10001 ] 2022-10-12 05:59:49.017  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-12 05:59:49.020 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-12 05:59:49.023 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-12 05:59:49.025 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-12 05:59:49.026  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-12 05:59:49.027  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-12 05:59:49.028  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-12 05:59:49.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-12 05:59:49.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-12 05:59:49.033 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-12 05:59:49.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-12 05:59:49.046 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 05:59:49.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 05:59:49.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 05:59:49.219  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-12 05:59:49.220  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-12 05:59:49.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-12 05:59:49.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 05:59:49.229  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-12 05:59:49.230  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-12 05:59:49.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 05:59:49.237 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 05:59:49.238 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 05:59:49.239 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 05:59:49.240 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 05:59:49.240 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 05:59:49.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 05:59:49.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 05:59:49.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 05:59:49.244 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-12 05:59:49.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380439817570493064171942754494616546398733413416 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 12 04:46:50 UTC 2022 Final Date: Mon Oct 11 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:fd:40:4b:46:5a:4f:db:7c:0a:01:fa:90:c7:f2:2a:bc:26:77:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 63a2e5a44656b7e7b4ed2563276dafeddb9c37cf c854b3f2d0eb0b89c740c8a3db5c40c9d37af226 9b228ccffc171a247b65ae206d1b192d9aa25303 ea3042e973b236076a119a37db623162a97395a9 4dfa76af2c188e776c8db03a5582a50387af224d ae84f1a4088dd23da3c6fdcfeb505d0bc308408e 1bddfa1883deebc67f56ec34267a29003f2f6457 07eb93dcb73c4fff039b0899c7fe1c09c8195a3f c57a7efdc1fd7793ba4b8647c53c43ad6d8ace5c 412b8b10ad1cfd6c42af2d4827070ecd1289bcce 7a838b43c0ff379acaba12aeb9eaddce62a60ef5 fcd814359b2d80f8fd801b5a2857fec7687be938 84e3f8aa641b84098bc09d4216056edc4daeec9b a9f02c49966264175c8993ae28caec12b1793002 dbf9979edbd7aa284f85c45ba16badc1288468c8 8f79fd7f02ea22779b1e6cb50b92997a80f3c4ef 946b4e3e815e5e8cf030b83454d145000573ccfe a1ece263ac53458044f1d910feb03d75e78dd90e e573ec09ed3e84fbea9e977c00c98ff34e236b1e 238c0464 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:9c:ab:37:9e:0c:f3:11:2d:e5:34:1e:d6:cc:77:29:c8:00:05:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-12 06:00:51.675  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-12 06:00:51.676 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-12 06:00:51.677 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-12 06:00:51.678 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-12 06:00:51.678  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-12 06:00:51.679  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-12 06:00:51.680  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-12 06:00:51.680 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-12 06:00:51.681 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-12 06:00:51.682 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-12 06:00:51.689 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-12 06:00:51.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:00:51.691 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:00:51.691 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:00:51.819  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-12 06:00:51.820  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-12 06:00:51.821 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-12 06:00:51.823 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:00:51.827  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-12 06:00:51.827  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-12 06:00:51.828 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:00:51.829 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:00:51.829 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:00:51.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:00:51.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:00:51.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:00:51.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:00:51.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:00:51.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:00:51.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-12 06:00:51.841 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380439817570493064171942754494616546398733413416 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 12 04:46:50 UTC 2022 Final Date: Mon Oct 11 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:fd:40:4b:46:5a:4f:db:7c:0a:01:fa:90:c7:f2:2a:bc:26:77:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 63a2e5a44656b7e7b4ed2563276dafeddb9c37cf c854b3f2d0eb0b89c740c8a3db5c40c9d37af226 9b228ccffc171a247b65ae206d1b192d9aa25303 ea3042e973b236076a119a37db623162a97395a9 4dfa76af2c188e776c8db03a5582a50387af224d ae84f1a4088dd23da3c6fdcfeb505d0bc308408e 1bddfa1883deebc67f56ec34267a29003f2f6457 07eb93dcb73c4fff039b0899c7fe1c09c8195a3f c57a7efdc1fd7793ba4b8647c53c43ad6d8ace5c 412b8b10ad1cfd6c42af2d4827070ecd1289bcce 7a838b43c0ff379acaba12aeb9eaddce62a60ef5 fcd814359b2d80f8fd801b5a2857fec7687be938 84e3f8aa641b84098bc09d4216056edc4daeec9b a9f02c49966264175c8993ae28caec12b1793002 dbf9979edbd7aa284f85c45ba16badc1288468c8 8f79fd7f02ea22779b1e6cb50b92997a80f3c4ef 946b4e3e815e5e8cf030b83454d145000573ccfe a1ece263ac53458044f1d910feb03d75e78dd90e e573ec09ed3e84fbea9e977c00c98ff34e236b1e 238c0464 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:62:4d:a6:41:d9:47:0f:d1:fb:57:4e:90:b7:90:88:d1:28:78:0f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-12 06:03:01.217  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-12 06:03:01.220 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-12 06:03:01.225 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-12 06:03:01.226 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-12 06:03:01.227  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-12 06:03:01.228  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-12 06:03:01.228  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-12 06:03:01.229 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-12 06:03:01.229 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-12 06:03:01.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-12 06:03:01.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-12 06:03:01.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:03:01.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:03:01.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:03:01.388  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-12 06:03:01.389  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-12 06:03:01.389 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-12 06:03:01.389 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:03:01.391  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-12 06:03:01.392  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-12 06:03:01.392 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:03:01.393 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:03:01.393 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:03:01.394 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:03:01.395 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:03:01.395 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:03:01.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:03:01.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:03:01.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:03:01.398 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-12 06:03:01.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380439817570493064171942754494616546398733413416 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 12 04:46:50 UTC 2022 Final Date: Mon Oct 11 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:fd:40:4b:46:5a:4f:db:7c:0a:01:fa:90:c7:f2:2a:bc:26:77:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 63a2e5a44656b7e7b4ed2563276dafeddb9c37cf c854b3f2d0eb0b89c740c8a3db5c40c9d37af226 9b228ccffc171a247b65ae206d1b192d9aa25303 ea3042e973b236076a119a37db623162a97395a9 4dfa76af2c188e776c8db03a5582a50387af224d ae84f1a4088dd23da3c6fdcfeb505d0bc308408e 1bddfa1883deebc67f56ec34267a29003f2f6457 07eb93dcb73c4fff039b0899c7fe1c09c8195a3f c57a7efdc1fd7793ba4b8647c53c43ad6d8ace5c 412b8b10ad1cfd6c42af2d4827070ecd1289bcce 7a838b43c0ff379acaba12aeb9eaddce62a60ef5 fcd814359b2d80f8fd801b5a2857fec7687be938 84e3f8aa641b84098bc09d4216056edc4daeec9b a9f02c49966264175c8993ae28caec12b1793002 dbf9979edbd7aa284f85c45ba16badc1288468c8 8f79fd7f02ea22779b1e6cb50b92997a80f3c4ef 946b4e3e815e5e8cf030b83454d145000573ccfe a1ece263ac53458044f1d910feb03d75e78dd90e e573ec09ed3e84fbea9e977c00c98ff34e236b1e 238c0464 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:42:b4:b0:76:0f:0f:e1:00:2e:56:2a:bc:07:50:e2:96:56:c6:a8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-12 06:11:33.685  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-12 06:11:33.690 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-12 06:11:33.693 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-12 06:11:33.695 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-12 06:11:33.695  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-12 06:11:33.696  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-12 06:11:33.697  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-12 06:11:33.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-12 06:11:33.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-12 06:11:33.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-12 06:11:33.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-12 06:11:33.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:11:33.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:11:33.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:11:33.865  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-12 06:11:33.866  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-12 06:11:33.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-12 06:11:33.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:11:33.868  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-12 06:11:33.868  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-12 06:11:33.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:11:33.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:11:33.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:11:33.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:11:33.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:11:33.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:11:33.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:11:33.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:11:33.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:11:33.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-12 06:11:33.878 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380439817570493064171942754494616546398733413416 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 12 04:46:50 UTC 2022 Final Date: Mon Oct 11 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:fd:40:4b:46:5a:4f:db:7c:0a:01:fa:90:c7:f2:2a:bc:26:77:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 63a2e5a44656b7e7b4ed2563276dafeddb9c37cf c854b3f2d0eb0b89c740c8a3db5c40c9d37af226 9b228ccffc171a247b65ae206d1b192d9aa25303 ea3042e973b236076a119a37db623162a97395a9 4dfa76af2c188e776c8db03a5582a50387af224d ae84f1a4088dd23da3c6fdcfeb505d0bc308408e 1bddfa1883deebc67f56ec34267a29003f2f6457 07eb93dcb73c4fff039b0899c7fe1c09c8195a3f c57a7efdc1fd7793ba4b8647c53c43ad6d8ace5c 412b8b10ad1cfd6c42af2d4827070ecd1289bcce 7a838b43c0ff379acaba12aeb9eaddce62a60ef5 fcd814359b2d80f8fd801b5a2857fec7687be938 84e3f8aa641b84098bc09d4216056edc4daeec9b a9f02c49966264175c8993ae28caec12b1793002 dbf9979edbd7aa284f85c45ba16badc1288468c8 8f79fd7f02ea22779b1e6cb50b92997a80f3c4ef 946b4e3e815e5e8cf030b83454d145000573ccfe a1ece263ac53458044f1d910feb03d75e78dd90e e573ec09ed3e84fbea9e977c00c98ff34e236b1e 238c0464 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0b:cc:e0:00:9a:d2:ab:cb:d3:24:43:4c:24:3a:e3:9a:8f:0b:61:41],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-12 06:16:11.061  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-12 06:16:11.065 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-12 06:16:11.074 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-12 06:16:11.077 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-12 06:16:11.078  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-12 06:16:11.079  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-12 06:16:11.080  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-12 06:16:11.086 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-12 06:16:11.086 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-12 06:16:11.087 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-12 06:16:11.106 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-12 06:16:11.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:16:11.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:16:11.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:16:11.301  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-12 06:16:11.302  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-12 06:16:11.303 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-12 06:16:11.303 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:16:11.305  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-12 06:16:11.305  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-12 06:16:11.306 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:16:11.306 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:16:11.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:16:11.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:16:11.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:16:11.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:16:11.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:16:11.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:16:11.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:16:11.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-12 06:16:11.321 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380439817570493064171942754494616546398733413416 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 12 04:46:50 UTC 2022 Final Date: Mon Oct 11 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:fd:40:4b:46:5a:4f:db:7c:0a:01:fa:90:c7:f2:2a:bc:26:77:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 63a2e5a44656b7e7b4ed2563276dafeddb9c37cf c854b3f2d0eb0b89c740c8a3db5c40c9d37af226 9b228ccffc171a247b65ae206d1b192d9aa25303 ea3042e973b236076a119a37db623162a97395a9 4dfa76af2c188e776c8db03a5582a50387af224d ae84f1a4088dd23da3c6fdcfeb505d0bc308408e 1bddfa1883deebc67f56ec34267a29003f2f6457 07eb93dcb73c4fff039b0899c7fe1c09c8195a3f c57a7efdc1fd7793ba4b8647c53c43ad6d8ace5c 412b8b10ad1cfd6c42af2d4827070ecd1289bcce 7a838b43c0ff379acaba12aeb9eaddce62a60ef5 fcd814359b2d80f8fd801b5a2857fec7687be938 84e3f8aa641b84098bc09d4216056edc4daeec9b a9f02c49966264175c8993ae28caec12b1793002 dbf9979edbd7aa284f85c45ba16badc1288468c8 8f79fd7f02ea22779b1e6cb50b92997a80f3c4ef 946b4e3e815e5e8cf030b83454d145000573ccfe a1ece263ac53458044f1d910feb03d75e78dd90e e573ec09ed3e84fbea9e977c00c98ff34e236b1e 238c0464 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:34:67:ad:eb:4f:c6:a7:ab:6a:1c:31:e3:e5:0a:43:16:eb:63:ae],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-12 06:16:34.574  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-12 06:16:34.576 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-12 06:16:34.578 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-12 06:16:34.578 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-12 06:16:34.579  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-12 06:16:34.580  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-12 06:16:34.580  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-12 06:16:34.580 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-12 06:16:34.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-12 06:16:34.582 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-12 06:16:34.597 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-12 06:16:34.601 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:16:34.604 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:16:34.604 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:16:34.728  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-12 06:16:34.729  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-12 06:16:34.729 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-12 06:16:34.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:16:34.734  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-12 06:16:34.735  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-12 06:16:34.736 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:16:34.736 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:16:34.736 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:16:34.737 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:16:34.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:16:34.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:16:34.739 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:16:34.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:16:34.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:16:34.741 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-12 06:16:34.745 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380439817570493064171942754494616546398733413416 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 12 04:46:50 UTC 2022 Final Date: Mon Oct 11 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:fd:40:4b:46:5a:4f:db:7c:0a:01:fa:90:c7:f2:2a:bc:26:77:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 63a2e5a44656b7e7b4ed2563276dafeddb9c37cf c854b3f2d0eb0b89c740c8a3db5c40c9d37af226 9b228ccffc171a247b65ae206d1b192d9aa25303 ea3042e973b236076a119a37db623162a97395a9 4dfa76af2c188e776c8db03a5582a50387af224d ae84f1a4088dd23da3c6fdcfeb505d0bc308408e 1bddfa1883deebc67f56ec34267a29003f2f6457 07eb93dcb73c4fff039b0899c7fe1c09c8195a3f c57a7efdc1fd7793ba4b8647c53c43ad6d8ace5c 412b8b10ad1cfd6c42af2d4827070ecd1289bcce 7a838b43c0ff379acaba12aeb9eaddce62a60ef5 fcd814359b2d80f8fd801b5a2857fec7687be938 84e3f8aa641b84098bc09d4216056edc4daeec9b a9f02c49966264175c8993ae28caec12b1793002 dbf9979edbd7aa284f85c45ba16badc1288468c8 8f79fd7f02ea22779b1e6cb50b92997a80f3c4ef 946b4e3e815e5e8cf030b83454d145000573ccfe a1ece263ac53458044f1d910feb03d75e78dd90e e573ec09ed3e84fbea9e977c00c98ff34e236b1e 238c0464 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:4f:fe:85:e5:6e:40:51:2a:a0:87:97:13:f5:1e:a3:11:8a:e2:6d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-12 06:36:17.849  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-12 06:36:17.852 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-12 06:36:17.856 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-12 06:36:17.857 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-12 06:36:17.857  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-12 06:36:17.858  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-12 06:36:17.859  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-12 06:36:17.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-12 06:36:17.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-12 06:36:17.860 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-12 06:36:17.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-12 06:36:17.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:36:17.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:36:17.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:36:18.003  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-12 06:36:18.004  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-12 06:36:18.004 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-12 06:36:18.004 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:36:18.006  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-12 06:36:18.007  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-12 06:36:18.008 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:36:18.008 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:36:18.008 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:36:18.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:36:18.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:36:18.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:36:18.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:36:18.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:36:18.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:36:18.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-12 06:36:18.020 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380439817570493064171942754494616546398733413416 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 12 04:46:50 UTC 2022 Final Date: Mon Oct 11 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:fd:40:4b:46:5a:4f:db:7c:0a:01:fa:90:c7:f2:2a:bc:26:77:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 63a2e5a44656b7e7b4ed2563276dafeddb9c37cf c854b3f2d0eb0b89c740c8a3db5c40c9d37af226 9b228ccffc171a247b65ae206d1b192d9aa25303 ea3042e973b236076a119a37db623162a97395a9 4dfa76af2c188e776c8db03a5582a50387af224d ae84f1a4088dd23da3c6fdcfeb505d0bc308408e 1bddfa1883deebc67f56ec34267a29003f2f6457 07eb93dcb73c4fff039b0899c7fe1c09c8195a3f c57a7efdc1fd7793ba4b8647c53c43ad6d8ace5c 412b8b10ad1cfd6c42af2d4827070ecd1289bcce 7a838b43c0ff379acaba12aeb9eaddce62a60ef5 fcd814359b2d80f8fd801b5a2857fec7687be938 84e3f8aa641b84098bc09d4216056edc4daeec9b a9f02c49966264175c8993ae28caec12b1793002 dbf9979edbd7aa284f85c45ba16badc1288468c8 8f79fd7f02ea22779b1e6cb50b92997a80f3c4ef 946b4e3e815e5e8cf030b83454d145000573ccfe a1ece263ac53458044f1d910feb03d75e78dd90e e573ec09ed3e84fbea9e977c00c98ff34e236b1e 238c0464 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:32:03:69:35:1c:51:f0:34:fc:67:18:4f:5e:c0:40:d5:5c:80:af],[56:66:d1:a4] modulus: c4d0984e48621c2a30b0e46ab37b8c384494d1c031a1c1eea4da8315f99bc6332efcfac6c9b164b1cacf9b6e17188ea5a3937b060b8c3ee859f516d3d7737a74b7d12540593b247a20d4db18a1af334f36eb8a3a086ec441626bf9653482e32363062081110d5d765ea6b3d6316c0a141341beb032d09fbfe06791162df11ec306b709ae7fddc557972e191993fb9c9fc025965eebe5bf9de044ab3c634eded4a282e6a3955b128d10801cb5ac211d90940ce0e2a0d36fe398517f5c86d2b664ffb1504bb90565eb2409e06fa4e35ad7be39a24ffb6802a959b9bc66357ca071719f9bd06c07ff4e9e3bf437aa9d0f1a28cceda4ddd4bb8e6764c1ccee579645 public exponent: 10001 ] 2022-10-12 06:36:25.437  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-12 06:36:25.439 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-12 06:36:25.440 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-12 06:36:25.441 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-12 06:36:25.442  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-12 06:36:25.442  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-12 06:36:25.443  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-12 06:36:25.443 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-12 06:36:25.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-12 06:36:25.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-12 06:36:25.448 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-12 06:36:25.449 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:36:25.449 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-12 06:36:25.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:36:25.549  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-12 06:36:25.550  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-12 06:36:25.551 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-12 06:36:25.551 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-12 06:36:25.553  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-12 06:36:25.553  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-12 06:36:25.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:36:25.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:36:25.555 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:36:25.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:36:25.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:36:25.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:36:25.557 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-12 06:36:25.558 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-12 06:36:25.558 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-12 06:36:25.560 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-12 06:36:25.564 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 380439817570493064171942754494616546398733413416 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 12 04:46:50 UTC 2022 Final Date: Mon Oct 11 04:46:49 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [15:fd:40:4b:46:5a:4f:db:7c:0a:01:fa:90:c7:f2:2a:bc:26:77:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 63a2e5a44656b7e7b4ed2563276dafeddb9c37cf c854b3f2d0eb0b89c740c8a3db5c40c9d37af226 9b228ccffc171a247b65ae206d1b192d9aa25303 ea3042e973b236076a119a37db623162a97395a9 4dfa76af2c188e776c8db03a5582a50387af224d ae84f1a4088dd23da3c6fdcfeb505d0bc308408e 1bddfa1883deebc67f56ec34267a29003f2f6457 07eb93dcb73c4fff039b0899c7fe1c09c8195a3f c57a7efdc1fd7793ba4b8647c53c43ad6d8ace5c 412b8b10ad1cfd6c42af2d4827070ecd1289bcce 7a838b43c0ff379acaba12aeb9eaddce62a60ef5 fcd814359b2d80f8fd801b5a2857fec7687be938 84e3f8aa641b84098bc09d4216056edc4daeec9b a9f02c49966264175c8993ae28caec12b1793002 dbf9979edbd7aa284f85c45ba16badc1288468c8 8f79fd7f02ea22779b1e6cb50b92997a80f3c4ef 946b4e3e815e5e8cf030b83454d145000573ccfe a1ece263ac53458044f1d910feb03d75e78dd90e e573ec09ed3e84fbea9e977c00c98ff34e236b1e 238c0464 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e3:82:f8:c0:e2:9e:cb:cc:64:22:c7:10:e4:4e:f9:ee:ac:8f:9d:b2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]