2022-10-24 05:23:00,238 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-24 05:23:01,181 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-24 05:23:01.878  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Oct 24, 2022 5:23:03 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 24, 2022 5:23:03 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 24, 2022 5:23:03 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 24, 2022 5:23:03 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-24 05:23:04.276 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-24 05:23:04.571  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-10-24 05:23:04.745  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-24 05:23:05.491 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-24 05:23:05.494 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-10-24 05:23:05.495 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-24 05:23:05.499 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-24 05:23:05.536 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-10-24 05:23:05.540 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-10-24 05:23:05.674 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-10-24 05:23:06.384 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 24, 2022 5:23:07 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-24 05:23:07.376  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.976 seconds (JVM running for 9.835) Oct 24, 2022 5:23:31 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-24 07:15:57.955  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-24 07:15:57.965 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-24 07:15:58.003 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-24 07:15:58.007 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-24 07:15:58.024  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-24 07:15:58.027  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-24 07:15:58.028  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-24 07:15:58.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-24 07:15:58.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:15:58.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-24 07:15:58.043 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-24 07:15:58.046 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-24 07:15:58.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-24 07:15:58.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:15:58.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:15:58.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:15:58.841  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-24 07:15:58.844  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-24 07:15:58.845 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-24 07:15:58.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:15:58.855  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-24 07:15:58.856  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-24 07:15:58.857 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:15:58.857 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:15:58.858 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:15:58.876 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:15:58.876 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:15:58.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:15:58.882 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:15:58.883 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:15:58.883 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:15:58.884 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-24 07:15:58.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 374316353762303595420092090261210430767225480196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 24 04:59:45 UTC 2022 Final Date: Sat Oct 23 04:59:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:97:e3:00:48:b1:db:24:bf:4c:74:6d:25:39:cb:8d:31:7c:69:85],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d8fedc7e8fcb3f9266dd5e4bb8f67763e3e411b e0234dcee8c94fb6722bd4afc6a7df17674bb2d6 394eb3ab5ffb24309e904d42a8171827a2962e74 b12b472e5f4201a725d146beca1c79ee6bae58fa bf44d0f409e764a1f0f9ceb0e6d98bd1da1d1a00 e001b41cbed2e026ecfde6c61479ea6cc90d466a 1817eb7838f1df7de0bbf2c4dc1ed3136c7093ee 558b8b7ab1795e37da5001b4b5c6445276cf6c3b c637ee8e5f57d454ebb1f19215c05faf7e43b977 7be9526f751a74c4e11a2d4da5d3ad55d8fbf38b 331cce1ee44961b51c391205e210b6558053ab0c 74da700b733f87951280f97120a4fcab94cfce10 44b2e388e324bed4b3bce6e7d175a5d6c229cfb8 f2373560d506b379c90c092ca2c20293a04b7d1c f942e931290302b5b0f77cfa62749ea643cc37c9 b61c535e21c1f446e5cd3c863eb22997b095e57e ace3b5812982570672b9148767fd921c09e264fa 636db7b7c347ceec09d7e7e7a73e9bfd94e2f5f3 2501525810d2f31b328b59d7a84321167faed25f 670f180d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e4:fe:49:bd:d7:d3:1c:d4:a0:63:1f:57:67:35:bc:f9:db:4b:f6:c6],[56:66:d1:a4] modulus: b72fb6f1932c39b713fd44b8b2317c5f527de1b0599b8644f36670941662106f2d49b11d2357ed6c27c8b32eb81b2f81f2250164aa457523916a32612a9694faca3aae463b36fd7793b79c215005c3d3a75c37a099c91c37f32b261194eec6541e775bf6ab74faca1676922e4c9c7f8425804ecf8fca7e2c412c5274d38ef45092bc0004b332cecfe10904d6c00e445cc047a5e55cd8590459af10a0d4a3d0270f70c5bf86e50d9ec44838a1a10043c46f85ae5f6ea72ee0e38fc851a5d597caf034fad3ade0258ee4f2022a24f86ebb1003cd87efb915af229fd436d1acbbeb281724fea2e0394a16d03370d9736940f3979f5079b83fb3865f9d9036d79c4d public exponent: 10001 ] 2022-10-24 07:17:30.514  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-24 07:17:30.518 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-24 07:17:30.521 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-24 07:17:30.522 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-24 07:17:30.522  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-24 07:17:30.523  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-24 07:17:30.524  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-24 07:17:30.524 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-24 07:17:30.525 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-24 07:17:30.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-24 07:17:30.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-24 07:17:30.533 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:17:30.534 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:17:30.534 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:17:30.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-24 07:17:30.672  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-24 07:17:30.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-24 07:17:30.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:17:30.676  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-24 07:17:30.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-24 07:17:30.677 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:17:30.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:17:30.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:17:30.680 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:17:30.680 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:17:30.680 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:17:30.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:17:30.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:17:30.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:17:30.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-24 07:17:30.689 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 374316353762303595420092090261210430767225480196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 24 04:59:45 UTC 2022 Final Date: Sat Oct 23 04:59:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:97:e3:00:48:b1:db:24:bf:4c:74:6d:25:39:cb:8d:31:7c:69:85],[56:66:d1:a4] modulus: abee51a258e2489c3d4a404ed35480b29ea3c501ec91afea68df991d09855f9bb2e3ff060d57af6b5421582e87b5df52f2f755c464c07bf5e26dad1bad759b80bfb01fce5a5f0c1e3504f014055051f2f8d7c5e7cca4a2768aef24f8fde94ffd58769bf868ce585d2b8c0f4580bef11a5a055b33c06e70dc3f8af2ce55c25bf2e16ab160e35ccf9a31076f8f1129c0e7cf63702d75190f047101444f766d52485b5ff6d2125e484c03acce79beca2d477f5a4bb9b8cfacb620690c8de772c454d541eb81c2d7712229d0f76528754dee5fc710b5952a8f73207c96dd1e32aeb9c0fc3afd4d218fbbe1681705b6166a73a2b61acf1f4416228962218ea53213fe285c81504f9ae64c1ffc5cff86cf274a71b8fee5c2609c06fbfcf027c033235f8d4a55337c73dde8bf9ff5e09bc19c835d9f12c1d3d1fcb98dfceeb4c4c2b70d3d5a6b3f68ccf899f6a06fd57fe19441312c882bd8a1e32674ad6df90f4d473e339887966aa3ccfcfabc09311f7e51bd7ed5a273d3aa7c76540ca94d0462faf1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d8fedc7e8fcb3f9266dd5e4bb8f67763e3e411b e0234dcee8c94fb6722bd4afc6a7df17674bb2d6 394eb3ab5ffb24309e904d42a8171827a2962e74 b12b472e5f4201a725d146beca1c79ee6bae58fa bf44d0f409e764a1f0f9ceb0e6d98bd1da1d1a00 e001b41cbed2e026ecfde6c61479ea6cc90d466a 1817eb7838f1df7de0bbf2c4dc1ed3136c7093ee 558b8b7ab1795e37da5001b4b5c6445276cf6c3b c637ee8e5f57d454ebb1f19215c05faf7e43b977 7be9526f751a74c4e11a2d4da5d3ad55d8fbf38b 331cce1ee44961b51c391205e210b6558053ab0c 74da700b733f87951280f97120a4fcab94cfce10 44b2e388e324bed4b3bce6e7d175a5d6c229cfb8 f2373560d506b379c90c092ca2c20293a04b7d1c f942e931290302b5b0f77cfa62749ea643cc37c9 b61c535e21c1f446e5cd3c863eb22997b095e57e ace3b5812982570672b9148767fd921c09e264fa 636db7b7c347ceec09d7e7e7a73e9bfd94e2f5f3 2501525810d2f31b328b59d7a84321167faed25f 670f180d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:f6:5f:ef:1b:45:4e:d7:ec:bf:37:8a:2e:a0:ff:57:d4:04:68:3a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-24 07:18:40.212  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-24 07:18:40.214 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-24 07:18:40.216 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-24 07:18:40.216 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-24 07:18:40.217  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-24 07:18:40.218  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-24 07:18:40.218  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-24 07:18:40.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-24 07:18:40.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-24 07:18:40.220 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-24 07:18:40.224 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-24 07:18:40.225 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:18:40.225 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:18:40.226 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:18:40.363  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-24 07:18:40.364  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-24 07:18:40.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-24 07:18:40.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:18:40.366  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-24 07:18:40.366  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-24 07:18:40.367 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:18:40.367 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:18:40.367 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:18:40.368 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:18:40.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:18:40.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:18:40.370 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:18:40.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:18:40.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:18:40.372 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-24 07:18:40.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 374316353762303595420092090261210430767225480196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 24 04:59:45 UTC 2022 Final Date: Sat Oct 23 04:59:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:97:e3:00:48:b1:db:24:bf:4c:74:6d:25:39:cb:8d:31:7c:69:85],[56:66:d1:a4] modulus: abee51a258e2489c3d4a404ed35480b29ea3c501ec91afea68df991d09855f9bb2e3ff060d57af6b5421582e87b5df52f2f755c464c07bf5e26dad1bad759b80bfb01fce5a5f0c1e3504f014055051f2f8d7c5e7cca4a2768aef24f8fde94ffd58769bf868ce585d2b8c0f4580bef11a5a055b33c06e70dc3f8af2ce55c25bf2e16ab160e35ccf9a31076f8f1129c0e7cf63702d75190f047101444f766d52485b5ff6d2125e484c03acce79beca2d477f5a4bb9b8cfacb620690c8de772c454d541eb81c2d7712229d0f76528754dee5fc710b5952a8f73207c96dd1e32aeb9c0fc3afd4d218fbbe1681705b6166a73a2b61acf1f4416228962218ea53213fe285c81504f9ae64c1ffc5cff86cf274a71b8fee5c2609c06fbfcf027c033235f8d4a55337c73dde8bf9ff5e09bc19c835d9f12c1d3d1fcb98dfceeb4c4c2b70d3d5a6b3f68ccf899f6a06fd57fe19441312c882bd8a1e32674ad6df90f4d473e339887966aa3ccfcfabc09311f7e51bd7ed5a273d3aa7c76540ca94d0462faf1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d8fedc7e8fcb3f9266dd5e4bb8f67763e3e411b e0234dcee8c94fb6722bd4afc6a7df17674bb2d6 394eb3ab5ffb24309e904d42a8171827a2962e74 b12b472e5f4201a725d146beca1c79ee6bae58fa bf44d0f409e764a1f0f9ceb0e6d98bd1da1d1a00 e001b41cbed2e026ecfde6c61479ea6cc90d466a 1817eb7838f1df7de0bbf2c4dc1ed3136c7093ee 558b8b7ab1795e37da5001b4b5c6445276cf6c3b c637ee8e5f57d454ebb1f19215c05faf7e43b977 7be9526f751a74c4e11a2d4da5d3ad55d8fbf38b 331cce1ee44961b51c391205e210b6558053ab0c 74da700b733f87951280f97120a4fcab94cfce10 44b2e388e324bed4b3bce6e7d175a5d6c229cfb8 f2373560d506b379c90c092ca2c20293a04b7d1c f942e931290302b5b0f77cfa62749ea643cc37c9 b61c535e21c1f446e5cd3c863eb22997b095e57e ace3b5812982570672b9148767fd921c09e264fa 636db7b7c347ceec09d7e7e7a73e9bfd94e2f5f3 2501525810d2f31b328b59d7a84321167faed25f 670f180d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:c5:df:3c:da:c8:a1:92:e9:93:5f:3f:48:28:71:5f:08:af:c9:39],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-24 07:20:40.212  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-24 07:20:40.214 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-24 07:20:40.224 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-24 07:20:40.225 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-24 07:20:40.226  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-24 07:20:40.227  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-24 07:20:40.227  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-24 07:20:40.228 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-24 07:20:40.228 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-24 07:20:40.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-24 07:20:40.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-24 07:20:40.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:20:40.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:20:40.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:20:40.374  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-24 07:20:40.375  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-24 07:20:40.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-24 07:20:40.376 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:20:40.378  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-24 07:20:40.378  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-24 07:20:40.379 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:20:40.379 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:20:40.380 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:20:40.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:20:40.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:20:40.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:20:40.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:20:40.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:20:40.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:20:40.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-24 07:20:40.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 374316353762303595420092090261210430767225480196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 24 04:59:45 UTC 2022 Final Date: Sat Oct 23 04:59:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:97:e3:00:48:b1:db:24:bf:4c:74:6d:25:39:cb:8d:31:7c:69:85],[56:66:d1:a4] modulus: abee51a258e2489c3d4a404ed35480b29ea3c501ec91afea68df991d09855f9bb2e3ff060d57af6b5421582e87b5df52f2f755c464c07bf5e26dad1bad759b80bfb01fce5a5f0c1e3504f014055051f2f8d7c5e7cca4a2768aef24f8fde94ffd58769bf868ce585d2b8c0f4580bef11a5a055b33c06e70dc3f8af2ce55c25bf2e16ab160e35ccf9a31076f8f1129c0e7cf63702d75190f047101444f766d52485b5ff6d2125e484c03acce79beca2d477f5a4bb9b8cfacb620690c8de772c454d541eb81c2d7712229d0f76528754dee5fc710b5952a8f73207c96dd1e32aeb9c0fc3afd4d218fbbe1681705b6166a73a2b61acf1f4416228962218ea53213fe285c81504f9ae64c1ffc5cff86cf274a71b8fee5c2609c06fbfcf027c033235f8d4a55337c73dde8bf9ff5e09bc19c835d9f12c1d3d1fcb98dfceeb4c4c2b70d3d5a6b3f68ccf899f6a06fd57fe19441312c882bd8a1e32674ad6df90f4d473e339887966aa3ccfcfabc09311f7e51bd7ed5a273d3aa7c76540ca94d0462faf1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d8fedc7e8fcb3f9266dd5e4bb8f67763e3e411b e0234dcee8c94fb6722bd4afc6a7df17674bb2d6 394eb3ab5ffb24309e904d42a8171827a2962e74 b12b472e5f4201a725d146beca1c79ee6bae58fa bf44d0f409e764a1f0f9ceb0e6d98bd1da1d1a00 e001b41cbed2e026ecfde6c61479ea6cc90d466a 1817eb7838f1df7de0bbf2c4dc1ed3136c7093ee 558b8b7ab1795e37da5001b4b5c6445276cf6c3b c637ee8e5f57d454ebb1f19215c05faf7e43b977 7be9526f751a74c4e11a2d4da5d3ad55d8fbf38b 331cce1ee44961b51c391205e210b6558053ab0c 74da700b733f87951280f97120a4fcab94cfce10 44b2e388e324bed4b3bce6e7d175a5d6c229cfb8 f2373560d506b379c90c092ca2c20293a04b7d1c f942e931290302b5b0f77cfa62749ea643cc37c9 b61c535e21c1f446e5cd3c863eb22997b095e57e ace3b5812982570672b9148767fd921c09e264fa 636db7b7c347ceec09d7e7e7a73e9bfd94e2f5f3 2501525810d2f31b328b59d7a84321167faed25f 670f180d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:0a:3d:d6:65:0b:b1:77:9d:78:ed:95:c8:70:ba:58:a7:a6:c2:93],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-24 07:29:40.132  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-24 07:29:40.139 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-24 07:29:40.146 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-24 07:29:40.147 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-24 07:29:40.147  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-24 07:29:40.148  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-24 07:29:40.148  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-24 07:29:40.153 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-24 07:29:40.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-24 07:29:40.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-24 07:29:40.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-24 07:29:40.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:29:40.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:29:40.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:29:40.343  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-24 07:29:40.344  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-24 07:29:40.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-24 07:29:40.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:29:40.346  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-24 07:29:40.346  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-24 07:29:40.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:29:40.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:29:40.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:29:40.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:29:40.349 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:29:40.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:29:40.351 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:29:40.351 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:29:40.351 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:29:40.353 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-24 07:29:40.359 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 374316353762303595420092090261210430767225480196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 24 04:59:45 UTC 2022 Final Date: Sat Oct 23 04:59:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:97:e3:00:48:b1:db:24:bf:4c:74:6d:25:39:cb:8d:31:7c:69:85],[56:66:d1:a4] modulus: abee51a258e2489c3d4a404ed35480b29ea3c501ec91afea68df991d09855f9bb2e3ff060d57af6b5421582e87b5df52f2f755c464c07bf5e26dad1bad759b80bfb01fce5a5f0c1e3504f014055051f2f8d7c5e7cca4a2768aef24f8fde94ffd58769bf868ce585d2b8c0f4580bef11a5a055b33c06e70dc3f8af2ce55c25bf2e16ab160e35ccf9a31076f8f1129c0e7cf63702d75190f047101444f766d52485b5ff6d2125e484c03acce79beca2d477f5a4bb9b8cfacb620690c8de772c454d541eb81c2d7712229d0f76528754dee5fc710b5952a8f73207c96dd1e32aeb9c0fc3afd4d218fbbe1681705b6166a73a2b61acf1f4416228962218ea53213fe285c81504f9ae64c1ffc5cff86cf274a71b8fee5c2609c06fbfcf027c033235f8d4a55337c73dde8bf9ff5e09bc19c835d9f12c1d3d1fcb98dfceeb4c4c2b70d3d5a6b3f68ccf899f6a06fd57fe19441312c882bd8a1e32674ad6df90f4d473e339887966aa3ccfcfabc09311f7e51bd7ed5a273d3aa7c76540ca94d0462faf1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d8fedc7e8fcb3f9266dd5e4bb8f67763e3e411b e0234dcee8c94fb6722bd4afc6a7df17674bb2d6 394eb3ab5ffb24309e904d42a8171827a2962e74 b12b472e5f4201a725d146beca1c79ee6bae58fa bf44d0f409e764a1f0f9ceb0e6d98bd1da1d1a00 e001b41cbed2e026ecfde6c61479ea6cc90d466a 1817eb7838f1df7de0bbf2c4dc1ed3136c7093ee 558b8b7ab1795e37da5001b4b5c6445276cf6c3b c637ee8e5f57d454ebb1f19215c05faf7e43b977 7be9526f751a74c4e11a2d4da5d3ad55d8fbf38b 331cce1ee44961b51c391205e210b6558053ab0c 74da700b733f87951280f97120a4fcab94cfce10 44b2e388e324bed4b3bce6e7d175a5d6c229cfb8 f2373560d506b379c90c092ca2c20293a04b7d1c f942e931290302b5b0f77cfa62749ea643cc37c9 b61c535e21c1f446e5cd3c863eb22997b095e57e ace3b5812982570672b9148767fd921c09e264fa 636db7b7c347ceec09d7e7e7a73e9bfd94e2f5f3 2501525810d2f31b328b59d7a84321167faed25f 670f180d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:94:a0:dd:39:1a:51:de:05:b1:4c:0b:c7:7b:8c:64:9e:0d:fc:c6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-24 07:34:09.048  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-24 07:34:09.053 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-24 07:34:09.057 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-24 07:34:09.058 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-24 07:34:09.059  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-24 07:34:09.060  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-24 07:34:09.061  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-24 07:34:09.061 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-24 07:34:09.061 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-24 07:34:09.062 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-24 07:34:09.068 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-24 07:34:09.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:34:09.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:34:09.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:34:09.208  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-24 07:34:09.209  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-24 07:34:09.209 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-24 07:34:09.209 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:34:09.211  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-24 07:34:09.211  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-24 07:34:09.212 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:34:09.212 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:34:09.213 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:34:09.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:34:09.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:34:09.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:34:09.216 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:34:09.216 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:34:09.217 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:34:09.218 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-24 07:34:09.221 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 374316353762303595420092090261210430767225480196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 24 04:59:45 UTC 2022 Final Date: Sat Oct 23 04:59:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:97:e3:00:48:b1:db:24:bf:4c:74:6d:25:39:cb:8d:31:7c:69:85],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d8fedc7e8fcb3f9266dd5e4bb8f67763e3e411b e0234dcee8c94fb6722bd4afc6a7df17674bb2d6 394eb3ab5ffb24309e904d42a8171827a2962e74 b12b472e5f4201a725d146beca1c79ee6bae58fa bf44d0f409e764a1f0f9ceb0e6d98bd1da1d1a00 e001b41cbed2e026ecfde6c61479ea6cc90d466a 1817eb7838f1df7de0bbf2c4dc1ed3136c7093ee 558b8b7ab1795e37da5001b4b5c6445276cf6c3b c637ee8e5f57d454ebb1f19215c05faf7e43b977 7be9526f751a74c4e11a2d4da5d3ad55d8fbf38b 331cce1ee44961b51c391205e210b6558053ab0c 74da700b733f87951280f97120a4fcab94cfce10 44b2e388e324bed4b3bce6e7d175a5d6c229cfb8 f2373560d506b379c90c092ca2c20293a04b7d1c f942e931290302b5b0f77cfa62749ea643cc37c9 b61c535e21c1f446e5cd3c863eb22997b095e57e ace3b5812982570672b9148767fd921c09e264fa 636db7b7c347ceec09d7e7e7a73e9bfd94e2f5f3 2501525810d2f31b328b59d7a84321167faed25f 670f180d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:66:cf:c1:67:3d:07:58:36:24:9e:ca:03:2a:08:9e:f4:c7:ca:f0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-24 07:34:26.215  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-24 07:34:26.217 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-24 07:34:26.218 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-24 07:34:26.219 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-24 07:34:26.220  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-24 07:34:26.220  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-24 07:34:26.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-24 07:34:26.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-24 07:34:26.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-24 07:34:26.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-24 07:34:26.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-24 07:34:26.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:34:26.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:34:26.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:34:26.336  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-24 07:34:26.337  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-24 07:34:26.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-24 07:34:26.338 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:34:26.339  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-24 07:34:26.339  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-24 07:34:26.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:34:26.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:34:26.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:34:26.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:34:26.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:34:26.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:34:26.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:34:26.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:34:26.346 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:34:26.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-24 07:34:26.350 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 374316353762303595420092090261210430767225480196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 24 04:59:45 UTC 2022 Final Date: Sat Oct 23 04:59:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:97:e3:00:48:b1:db:24:bf:4c:74:6d:25:39:cb:8d:31:7c:69:85],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d8fedc7e8fcb3f9266dd5e4bb8f67763e3e411b e0234dcee8c94fb6722bd4afc6a7df17674bb2d6 394eb3ab5ffb24309e904d42a8171827a2962e74 b12b472e5f4201a725d146beca1c79ee6bae58fa bf44d0f409e764a1f0f9ceb0e6d98bd1da1d1a00 e001b41cbed2e026ecfde6c61479ea6cc90d466a 1817eb7838f1df7de0bbf2c4dc1ed3136c7093ee 558b8b7ab1795e37da5001b4b5c6445276cf6c3b c637ee8e5f57d454ebb1f19215c05faf7e43b977 7be9526f751a74c4e11a2d4da5d3ad55d8fbf38b 331cce1ee44961b51c391205e210b6558053ab0c 74da700b733f87951280f97120a4fcab94cfce10 44b2e388e324bed4b3bce6e7d175a5d6c229cfb8 f2373560d506b379c90c092ca2c20293a04b7d1c f942e931290302b5b0f77cfa62749ea643cc37c9 b61c535e21c1f446e5cd3c863eb22997b095e57e ace3b5812982570672b9148767fd921c09e264fa 636db7b7c347ceec09d7e7e7a73e9bfd94e2f5f3 2501525810d2f31b328b59d7a84321167faed25f 670f180d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:48:12:cc:e8:75:6c:29:22:26:f1:11:ca:24:42:06:81:03:8c:36],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-24 07:51:51.106  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-24 07:51:51.110 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-24 07:51:51.113 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-24 07:51:51.114 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-24 07:51:51.115  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-24 07:51:51.115  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-24 07:51:51.116  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-24 07:51:51.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-24 07:51:51.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-24 07:51:51.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-24 07:51:51.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-24 07:51:51.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:51:51.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:51:51.124 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:51:51.244  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-24 07:51:51.244  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-24 07:51:51.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-24 07:51:51.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:51:51.247  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-24 07:51:51.247  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-24 07:51:51.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:51:51.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:51:51.249 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:51:51.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:51:51.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:51:51.251 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:51:51.251 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:51:51.252 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:51:51.252 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:51:51.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-24 07:51:51.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 374316353762303595420092090261210430767225480196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 24 04:59:45 UTC 2022 Final Date: Sat Oct 23 04:59:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:97:e3:00:48:b1:db:24:bf:4c:74:6d:25:39:cb:8d:31:7c:69:85],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d8fedc7e8fcb3f9266dd5e4bb8f67763e3e411b e0234dcee8c94fb6722bd4afc6a7df17674bb2d6 394eb3ab5ffb24309e904d42a8171827a2962e74 b12b472e5f4201a725d146beca1c79ee6bae58fa bf44d0f409e764a1f0f9ceb0e6d98bd1da1d1a00 e001b41cbed2e026ecfde6c61479ea6cc90d466a 1817eb7838f1df7de0bbf2c4dc1ed3136c7093ee 558b8b7ab1795e37da5001b4b5c6445276cf6c3b c637ee8e5f57d454ebb1f19215c05faf7e43b977 7be9526f751a74c4e11a2d4da5d3ad55d8fbf38b 331cce1ee44961b51c391205e210b6558053ab0c 74da700b733f87951280f97120a4fcab94cfce10 44b2e388e324bed4b3bce6e7d175a5d6c229cfb8 f2373560d506b379c90c092ca2c20293a04b7d1c f942e931290302b5b0f77cfa62749ea643cc37c9 b61c535e21c1f446e5cd3c863eb22997b095e57e ace3b5812982570672b9148767fd921c09e264fa 636db7b7c347ceec09d7e7e7a73e9bfd94e2f5f3 2501525810d2f31b328b59d7a84321167faed25f 670f180d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:71:32:a0:9a:0b:94:65:82:1f:7c:91:16:75:39:04:f0:c6:b9:6f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-24 07:51:56.273  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-24 07:51:56.274 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-24 07:51:56.276 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-24 07:51:56.276 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-24 07:51:56.277  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-24 07:51:56.277  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-24 07:51:56.278  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-24 07:51:56.278 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-24 07:51:56.278 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-24 07:51:56.278 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-24 07:51:56.282 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-24 07:51:56.282 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:51:56.283 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-24 07:51:56.283 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:51:56.374  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-24 07:51:56.375  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-24 07:51:56.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-24 07:51:56.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-24 07:51:56.376  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-24 07:51:56.377  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-24 07:51:56.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:51:56.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:51:56.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:51:56.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:51:56.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:51:56.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:51:56.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-24 07:51:56.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-24 07:51:56.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-24 07:51:56.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-24 07:51:56.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 374316353762303595420092090261210430767225480196 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Oct 24 04:59:45 UTC 2022 Final Date: Sat Oct 23 04:59:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:97:e3:00:48:b1:db:24:bf:4c:74:6d:25:39:cb:8d:31:7c:69:85],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7d8fedc7e8fcb3f9266dd5e4bb8f67763e3e411b e0234dcee8c94fb6722bd4afc6a7df17674bb2d6 394eb3ab5ffb24309e904d42a8171827a2962e74 b12b472e5f4201a725d146beca1c79ee6bae58fa bf44d0f409e764a1f0f9ceb0e6d98bd1da1d1a00 e001b41cbed2e026ecfde6c61479ea6cc90d466a 1817eb7838f1df7de0bbf2c4dc1ed3136c7093ee 558b8b7ab1795e37da5001b4b5c6445276cf6c3b c637ee8e5f57d454ebb1f19215c05faf7e43b977 7be9526f751a74c4e11a2d4da5d3ad55d8fbf38b 331cce1ee44961b51c391205e210b6558053ab0c 74da700b733f87951280f97120a4fcab94cfce10 44b2e388e324bed4b3bce6e7d175a5d6c229cfb8 f2373560d506b379c90c092ca2c20293a04b7d1c f942e931290302b5b0f77cfa62749ea643cc37c9 b61c535e21c1f446e5cd3c863eb22997b095e57e ace3b5812982570672b9148767fd921c09e264fa 636db7b7c347ceec09d7e7e7a73e9bfd94e2f5f3 2501525810d2f31b328b59d7a84321167faed25f 670f180d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:31:7e:cf:11:9b:18:0d:63:02:b1:b1:40:0c:0d:7f:54:84:64:64],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]