2022-05-19 13:04:17,760 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-19 13:04:21,761 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-19 13:04:24.360  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default May 19, 2022 1:04:32 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 19, 2022 1:04:32 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 19, 2022 1:04:32 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 19, 2022 1:04:33 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-19 13:04:34.976 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-19 13:04:36.069  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-05-19 13:04:36.760  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-19 13:04:39.663 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-19 13:04:39.666 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-19 13:04:39.667 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-19 13:04:39.670 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-19 13:04:39.863 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-19 13:04:39.866 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-19 13:04:40.364 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-05-19 13:04:44.167 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 19, 2022 1:04:46 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-19 13:04:47.876  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 33.11 seconds (JVM running for 40.11) May 19, 2022 1:04:51 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-19 13:07:49.460  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-19 13:07:49.468 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-19 13:07:49.580 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-19 13:07:49.659 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-19 13:07:49.674  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-19 13:07:49.677  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-19 13:07:49.756  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-19 13:07:49.757 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 13:07:49.758 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 13:07:49.765 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 13:07:49.772 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-19 13:07:49.858 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-19 13:07:49.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-19 13:07:49.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 13:07:49.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 13:07:49.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 13:07:51.676  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-19 13:07:51.678  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-19 13:07:51.679 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-19 13:07:51.680 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 13:07:51.759  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-19 13:07:51.760  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-19 13:07:51.760 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 13:07:51.761 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 13:07:51.761 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 13:07:51.771 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 13:07:51.771 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 13:07:51.772 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 13:07:51.860 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 13:07:51.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 13:07:51.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 13:07:51.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-19 13:07:51.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623172992346459899773106765601350291766553782567 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 19 12:59:51 UTC 2022 Final Date: Tue May 18 12:59:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:e5:ac:d8:96:e6:3b:05:18:96:e5:90:bc:8b:72:fb:23:d9:45:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b228421d67cf0aa8c80cabec4220acf07e3f1d0e 575d35e83d3962c65fd00d2272746c520b32d958 10bd2410caf3fbbd4ec3c06923ff8fd2ba4a23dd 9141eff7de91485781734b7004fe051d27210fed a0c399ea79bfb42adfd7545e9063c9ee0a448c21 5e0864799fb163b3b303103ec25e8d07dae80486 17c4eb088c892ad1a5c10a1d9de868a425b94643 44c852249042556e1eb7cd1a3c36c150fe161329 8df6e477a03d554fb4250295de43b69d7c030622 b58a1cc20dbdeae1148a82c39499742b51e31f3d 054e85534f7a82df90ab09c731ba6b5631624643 734f6927564b3a0aecd4f77aed0427bd366957d7 172737631c50f0ffdbcd711a5b518b0225bea0e1 d8164f1eecc6bb73a56d9a87e4172142052ae3b7 cb26559a650c1cb3ffa2566ebce16a42c9768680 0a3cc5173fdd3353aef926d369013a2f0cb1a6a1 588ec239880f6d8359b9adacdf05a864e4a7226a 656588e8add2f954adbb9ea00c4981b9c82bc6ac f7137bbffe83a186a9085edeec1776d1d2ea6eea becfbae1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:59:cb:68:c0:b8:45:b4:17:20:f3:85:e8:df:58:37:0f:21:9f:ad] modulus: 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 public exponent: 10001 ] 2022-05-19 17:29:43.318  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-19 17:29:43.320 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-19 17:29:43.322 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-19 17:29:43.324 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-19 17:29:43.325  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-19 17:29:43.326  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-19 17:29:43.327  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-19 17:29:43.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 17:29:43.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-19 17:29:43.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-19 17:29:43.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-19 17:29:43.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:29:43.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:29:43.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:29:43.482  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-19 17:29:43.483  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-19 17:29:43.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-19 17:29:43.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:29:43.487  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-19 17:29:43.487  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-19 17:29:43.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:29:43.489 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:29:43.489 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:29:43.490 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:29:43.491 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:29:43.491 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:29:43.492 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:29:43.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:29:43.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:29:43.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-19 17:29:43.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623172992346459899773106765601350291766553782567 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 19 12:59:51 UTC 2022 Final Date: Tue May 18 12:59:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:e5:ac:d8:96:e6:3b:05:18:96:e5:90:bc:8b:72:fb:23:d9:45:80] modulus: b9fe5f3fc2eeff6a93ca088e42abd3dde3437c3336f5ad13d9aac3f3375381e82d143ab2679eba69c6e089361008e36affed8cb57c15fd17a54599c4133e4103209fbf3d388b1cb84804f5026bb0f3f3ed57f0283df801cd525a227524d15b991179e3f94833bcadb713e271ed75c07c17e3960d7d5dce72f9e3ff00cd42cf87611c9a65105b11a9c882b55972e13af82de360247bad76c2441c6618014c6cd104a947397b7cd8d7c82c889209e472fe91c0b76c58c49268117b2fb6e83072121256b611dc6cd1e3cf0059e9fe9be42367d9fa9edee8ab139c6a2a9d05baeb0b4f990e4bda83d5ea827d1971ebea5399c6838152aa47c291bf87c9de3ee22512f9df42ea56e75138f30e16884a4d7324b71c02a1bb5b9d98ba72008385abcdfd87dc2560e715399ce8f475916527db87bba93b214466da0e5d20ee87a8bb52b136ddaab8232e3edb11a0caf1bbf59faeeb1aacdbfafcf1769cd570ab38e7d8d6f62bdd01f8afd1d0d70514761199f0a27fd15edc867176a85d493cb3d4f5b91f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b228421d67cf0aa8c80cabec4220acf07e3f1d0e 575d35e83d3962c65fd00d2272746c520b32d958 10bd2410caf3fbbd4ec3c06923ff8fd2ba4a23dd 9141eff7de91485781734b7004fe051d27210fed a0c399ea79bfb42adfd7545e9063c9ee0a448c21 5e0864799fb163b3b303103ec25e8d07dae80486 17c4eb088c892ad1a5c10a1d9de868a425b94643 44c852249042556e1eb7cd1a3c36c150fe161329 8df6e477a03d554fb4250295de43b69d7c030622 b58a1cc20dbdeae1148a82c39499742b51e31f3d 054e85534f7a82df90ab09c731ba6b5631624643 734f6927564b3a0aecd4f77aed0427bd366957d7 172737631c50f0ffdbcd711a5b518b0225bea0e1 d8164f1eecc6bb73a56d9a87e4172142052ae3b7 cb26559a650c1cb3ffa2566ebce16a42c9768680 0a3cc5173fdd3353aef926d369013a2f0cb1a6a1 588ec239880f6d8359b9adacdf05a864e4a7226a 656588e8add2f954adbb9ea00c4981b9c82bc6ac f7137bbffe83a186a9085edeec1776d1d2ea6eea becfbae1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:0d:8f:6c:74:b5:41:73:04:cd:6a:8c:3a:d8:e2:59:a3:c3:8a:2d] modulus: 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 public exponent: 10001 ] 2022-05-19 17:34:15.369  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-19 17:34:15.370 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-19 17:34:15.372 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-19 17:34:15.372 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-19 17:34:15.373  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-19 17:34:15.373  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-19 17:34:15.374  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-19 17:34:15.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 17:34:15.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-19 17:34:15.375 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-19 17:34:15.382 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-19 17:34:15.383 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:34:15.383 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:34:15.383 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:34:15.548  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-19 17:34:15.555  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-19 17:34:15.556 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-19 17:34:15.556 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:34:15.558  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-19 17:34:15.558  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-19 17:34:15.558 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:34:15.558 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:34:15.559 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:34:15.559 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:34:15.560 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:34:15.560 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:34:15.560 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:34:15.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:34:15.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:34:15.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-19 17:34:15.564 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623172992346459899773106765601350291766553782567 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 19 12:59:51 UTC 2022 Final Date: Tue May 18 12:59:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:e5:ac:d8:96:e6:3b:05:18:96:e5:90:bc:8b:72:fb:23:d9:45:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b228421d67cf0aa8c80cabec4220acf07e3f1d0e 575d35e83d3962c65fd00d2272746c520b32d958 10bd2410caf3fbbd4ec3c06923ff8fd2ba4a23dd 9141eff7de91485781734b7004fe051d27210fed a0c399ea79bfb42adfd7545e9063c9ee0a448c21 5e0864799fb163b3b303103ec25e8d07dae80486 17c4eb088c892ad1a5c10a1d9de868a425b94643 44c852249042556e1eb7cd1a3c36c150fe161329 8df6e477a03d554fb4250295de43b69d7c030622 b58a1cc20dbdeae1148a82c39499742b51e31f3d 054e85534f7a82df90ab09c731ba6b5631624643 734f6927564b3a0aecd4f77aed0427bd366957d7 172737631c50f0ffdbcd711a5b518b0225bea0e1 d8164f1eecc6bb73a56d9a87e4172142052ae3b7 cb26559a650c1cb3ffa2566ebce16a42c9768680 0a3cc5173fdd3353aef926d369013a2f0cb1a6a1 588ec239880f6d8359b9adacdf05a864e4a7226a 656588e8add2f954adbb9ea00c4981b9c82bc6ac f7137bbffe83a186a9085edeec1776d1d2ea6eea becfbae1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:c0:aa:94:68:ba:90:26:13:9f:60:73:7d:c0:98:f5:7a:5a:02:0b] modulus: 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 public exponent: 10001 ] 2022-05-19 17:35:52.560  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-19 17:35:52.562 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-19 17:35:52.564 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-19 17:35:52.564 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-19 17:35:52.565  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-19 17:35:52.566  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-19 17:35:52.566  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-19 17:35:52.566 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 17:35:52.567 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-19 17:35:52.567 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-19 17:35:52.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-19 17:35:52.573 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:35:52.573 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:35:52.573 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:35:52.683  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-19 17:35:52.683  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-19 17:35:52.684 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-19 17:35:52.684 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:35:52.685  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-19 17:35:52.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-19 17:35:52.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:35:52.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:35:52.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:35:52.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:35:52.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:35:52.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:35:52.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:35:52.689 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:35:52.689 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:35:52.689 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-19 17:35:52.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623172992346459899773106765601350291766553782567 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 19 12:59:51 UTC 2022 Final Date: Tue May 18 12:59:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:e5:ac:d8:96:e6:3b:05:18:96:e5:90:bc:8b:72:fb:23:d9:45:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b228421d67cf0aa8c80cabec4220acf07e3f1d0e 575d35e83d3962c65fd00d2272746c520b32d958 10bd2410caf3fbbd4ec3c06923ff8fd2ba4a23dd 9141eff7de91485781734b7004fe051d27210fed a0c399ea79bfb42adfd7545e9063c9ee0a448c21 5e0864799fb163b3b303103ec25e8d07dae80486 17c4eb088c892ad1a5c10a1d9de868a425b94643 44c852249042556e1eb7cd1a3c36c150fe161329 8df6e477a03d554fb4250295de43b69d7c030622 b58a1cc20dbdeae1148a82c39499742b51e31f3d 054e85534f7a82df90ab09c731ba6b5631624643 734f6927564b3a0aecd4f77aed0427bd366957d7 172737631c50f0ffdbcd711a5b518b0225bea0e1 d8164f1eecc6bb73a56d9a87e4172142052ae3b7 cb26559a650c1cb3ffa2566ebce16a42c9768680 0a3cc5173fdd3353aef926d369013a2f0cb1a6a1 588ec239880f6d8359b9adacdf05a864e4a7226a 656588e8add2f954adbb9ea00c4981b9c82bc6ac f7137bbffe83a186a9085edeec1776d1d2ea6eea becfbae1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:a6:99:8f:e6:d9:3f:33:7a:81:af:d5:aa:09:b4:74:70:03:b4:f2] modulus: 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 public exponent: 10001 ] 2022-05-19 17:39:21.807  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-19 17:39:21.808 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-19 17:39:21.809 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-19 17:39:21.810 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-19 17:39:21.810  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-19 17:39:21.811  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-19 17:39:21.811  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-19 17:39:21.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 17:39:21.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-19 17:39:21.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-19 17:39:21.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-19 17:39:21.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:39:21.818 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:39:21.818 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:39:21.926  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-19 17:39:21.927  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-19 17:39:21.927 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-19 17:39:21.927 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:39:21.929  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-19 17:39:21.929  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-19 17:39:21.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:39:21.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:39:21.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:39:21.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:39:21.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:39:21.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:39:21.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:39:21.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:39:21.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:39:21.933 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-19 17:39:21.936 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623172992346459899773106765601350291766553782567 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 19 12:59:51 UTC 2022 Final Date: Tue May 18 12:59:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:e5:ac:d8:96:e6:3b:05:18:96:e5:90:bc:8b:72:fb:23:d9:45:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b228421d67cf0aa8c80cabec4220acf07e3f1d0e 575d35e83d3962c65fd00d2272746c520b32d958 10bd2410caf3fbbd4ec3c06923ff8fd2ba4a23dd 9141eff7de91485781734b7004fe051d27210fed a0c399ea79bfb42adfd7545e9063c9ee0a448c21 5e0864799fb163b3b303103ec25e8d07dae80486 17c4eb088c892ad1a5c10a1d9de868a425b94643 44c852249042556e1eb7cd1a3c36c150fe161329 8df6e477a03d554fb4250295de43b69d7c030622 b58a1cc20dbdeae1148a82c39499742b51e31f3d 054e85534f7a82df90ab09c731ba6b5631624643 734f6927564b3a0aecd4f77aed0427bd366957d7 172737631c50f0ffdbcd711a5b518b0225bea0e1 d8164f1eecc6bb73a56d9a87e4172142052ae3b7 cb26559a650c1cb3ffa2566ebce16a42c9768680 0a3cc5173fdd3353aef926d369013a2f0cb1a6a1 588ec239880f6d8359b9adacdf05a864e4a7226a 656588e8add2f954adbb9ea00c4981b9c82bc6ac f7137bbffe83a186a9085edeec1776d1d2ea6eea becfbae1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:b2:ce:ea:76:b3:6e:a3:1f:66:49:fc:fe:db:69:28:eb:15:a5:91] modulus: cd1e63d43ef3b87229ce039896a9d6f70d63b1638294207c6a4ed05e76511f9d8ca83e73160b6cae25adc87929499256b25e6ff284fed3602eb51fb65f13ba67ba06760d498e940e1bf09760a11622b51e07c10e48c22eba183e95356c805a9ea62dbe0d81ff474a956113d19c4f227c6d72583e806e89dabd53dda9669796019d1bc7c00645bb5317efb4372f30920d0a7e39e0086e28cada57b6b1e43bac91177ba72e5e880e3657b2fe111447d6b0e47ce1d8c5d31f75bc77b82d8b4a052b27e222c4c74438ac3d00326b924bb9e6f0c812caceabcdb70cdb7da4449224b54880ba222e2dbcee2a53a4217ee41ddbf7141a3dbb66bbb8c47c949e592a90cd public exponent: 10001 ] 2022-05-19 17:43:05.702  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-19 17:43:05.703 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-19 17:43:05.704 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-19 17:43:05.705 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-19 17:43:05.705  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-19 17:43:05.706  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-19 17:43:05.706  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-19 17:43:05.706 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 17:43:05.707 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-19 17:43:05.707 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-19 17:43:05.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-19 17:43:05.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:43:05.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:43:05.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:43:05.797  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-19 17:43:05.797  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-19 17:43:05.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-19 17:43:05.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:43:05.799  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-19 17:43:05.799  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-19 17:43:05.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:43:05.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:43:05.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:43:05.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:43:05.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:43:05.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:43:05.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:43:05.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:43:05.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:43:05.803 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-19 17:43:05.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623172992346459899773106765601350291766553782567 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 19 12:59:51 UTC 2022 Final Date: Tue May 18 12:59:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:e5:ac:d8:96:e6:3b:05:18:96:e5:90:bc:8b:72:fb:23:d9:45:80] modulus: b9fe5f3fc2eeff6a93ca088e42abd3dde3437c3336f5ad13d9aac3f3375381e82d143ab2679eba69c6e089361008e36affed8cb57c15fd17a54599c4133e4103209fbf3d388b1cb84804f5026bb0f3f3ed57f0283df801cd525a227524d15b991179e3f94833bcadb713e271ed75c07c17e3960d7d5dce72f9e3ff00cd42cf87611c9a65105b11a9c882b55972e13af82de360247bad76c2441c6618014c6cd104a947397b7cd8d7c82c889209e472fe91c0b76c58c49268117b2fb6e83072121256b611dc6cd1e3cf0059e9fe9be42367d9fa9edee8ab139c6a2a9d05baeb0b4f990e4bda83d5ea827d1971ebea5399c6838152aa47c291bf87c9de3ee22512f9df42ea56e75138f30e16884a4d7324b71c02a1bb5b9d98ba72008385abcdfd87dc2560e715399ce8f475916527db87bba93b214466da0e5d20ee87a8bb52b136ddaab8232e3edb11a0caf1bbf59faeeb1aacdbfafcf1769cd570ab38e7d8d6f62bdd01f8afd1d0d70514761199f0a27fd15edc867176a85d493cb3d4f5b91f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b228421d67cf0aa8c80cabec4220acf07e3f1d0e 575d35e83d3962c65fd00d2272746c520b32d958 10bd2410caf3fbbd4ec3c06923ff8fd2ba4a23dd 9141eff7de91485781734b7004fe051d27210fed a0c399ea79bfb42adfd7545e9063c9ee0a448c21 5e0864799fb163b3b303103ec25e8d07dae80486 17c4eb088c892ad1a5c10a1d9de868a425b94643 44c852249042556e1eb7cd1a3c36c150fe161329 8df6e477a03d554fb4250295de43b69d7c030622 b58a1cc20dbdeae1148a82c39499742b51e31f3d 054e85534f7a82df90ab09c731ba6b5631624643 734f6927564b3a0aecd4f77aed0427bd366957d7 172737631c50f0ffdbcd711a5b518b0225bea0e1 d8164f1eecc6bb73a56d9a87e4172142052ae3b7 cb26559a650c1cb3ffa2566ebce16a42c9768680 0a3cc5173fdd3353aef926d369013a2f0cb1a6a1 588ec239880f6d8359b9adacdf05a864e4a7226a 656588e8add2f954adbb9ea00c4981b9c82bc6ac f7137bbffe83a186a9085edeec1776d1d2ea6eea becfbae1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:bb:21:13:6d:70:3c:26:10:49:84:33:4e:4e:fa:fc:e5:fb:70:ae] modulus: 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 public exponent: 10001 ] 2022-05-19 17:47:11.262  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-19 17:47:11.264 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-19 17:47:11.265 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-19 17:47:11.266 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-19 17:47:11.266  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-19 17:47:11.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-19 17:47:11.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-19 17:47:11.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 17:47:11.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-19 17:47:11.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-19 17:47:11.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-19 17:47:11.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:47:11.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:47:11.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:47:11.362  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-19 17:47:11.362  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-19 17:47:11.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-19 17:47:11.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:47:11.364  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-19 17:47:11.364  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-19 17:47:11.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:47:11.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:47:11.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:47:11.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:47:11.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:47:11.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:47:11.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:47:11.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:47:11.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:47:11.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-19 17:47:11.370 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623172992346459899773106765601350291766553782567 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 19 12:59:51 UTC 2022 Final Date: Tue May 18 12:59:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:e5:ac:d8:96:e6:3b:05:18:96:e5:90:bc:8b:72:fb:23:d9:45:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b228421d67cf0aa8c80cabec4220acf07e3f1d0e 575d35e83d3962c65fd00d2272746c520b32d958 10bd2410caf3fbbd4ec3c06923ff8fd2ba4a23dd 9141eff7de91485781734b7004fe051d27210fed a0c399ea79bfb42adfd7545e9063c9ee0a448c21 5e0864799fb163b3b303103ec25e8d07dae80486 17c4eb088c892ad1a5c10a1d9de868a425b94643 44c852249042556e1eb7cd1a3c36c150fe161329 8df6e477a03d554fb4250295de43b69d7c030622 b58a1cc20dbdeae1148a82c39499742b51e31f3d 054e85534f7a82df90ab09c731ba6b5631624643 734f6927564b3a0aecd4f77aed0427bd366957d7 172737631c50f0ffdbcd711a5b518b0225bea0e1 d8164f1eecc6bb73a56d9a87e4172142052ae3b7 cb26559a650c1cb3ffa2566ebce16a42c9768680 0a3cc5173fdd3353aef926d369013a2f0cb1a6a1 588ec239880f6d8359b9adacdf05a864e4a7226a 656588e8add2f954adbb9ea00c4981b9c82bc6ac f7137bbffe83a186a9085edeec1776d1d2ea6eea becfbae1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:a2:e2:43:dc:76:ad:8f:ae:ff:d3:ee:9a:f6:da:62:16:fa:0a:e9] modulus: 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 public exponent: 10001 ] 2022-05-19 17:55:09.687  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-19 17:55:09.689 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-19 17:55:09.691 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-19 17:55:09.691 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-19 17:55:09.692  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-19 17:55:09.692  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-19 17:55:09.693  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-19 17:55:09.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 17:55:09.693 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-19 17:55:09.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-19 17:55:09.698 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-19 17:55:09.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:55:09.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:55:09.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:55:09.795  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-19 17:55:09.796  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-19 17:55:09.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-19 17:55:09.797 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:55:09.798  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-19 17:55:09.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-19 17:55:09.799 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:55:09.799 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:55:09.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:55:09.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:55:09.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:55:09.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:55:09.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:55:09.802 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:55:09.802 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:55:09.803 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-19 17:55:09.806 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623172992346459899773106765601350291766553782567 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 19 12:59:51 UTC 2022 Final Date: Tue May 18 12:59:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:e5:ac:d8:96:e6:3b:05:18:96:e5:90:bc:8b:72:fb:23:d9:45:80] modulus: b9fe5f3fc2eeff6a93ca088e42abd3dde3437c3336f5ad13d9aac3f3375381e82d143ab2679eba69c6e089361008e36affed8cb57c15fd17a54599c4133e4103209fbf3d388b1cb84804f5026bb0f3f3ed57f0283df801cd525a227524d15b991179e3f94833bcadb713e271ed75c07c17e3960d7d5dce72f9e3ff00cd42cf87611c9a65105b11a9c882b55972e13af82de360247bad76c2441c6618014c6cd104a947397b7cd8d7c82c889209e472fe91c0b76c58c49268117b2fb6e83072121256b611dc6cd1e3cf0059e9fe9be42367d9fa9edee8ab139c6a2a9d05baeb0b4f990e4bda83d5ea827d1971ebea5399c6838152aa47c291bf87c9de3ee22512f9df42ea56e75138f30e16884a4d7324b71c02a1bb5b9d98ba72008385abcdfd87dc2560e715399ce8f475916527db87bba93b214466da0e5d20ee87a8bb52b136ddaab8232e3edb11a0caf1bbf59faeeb1aacdbfafcf1769cd570ab38e7d8d6f62bdd01f8afd1d0d70514761199f0a27fd15edc867176a85d493cb3d4f5b91f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b228421d67cf0aa8c80cabec4220acf07e3f1d0e 575d35e83d3962c65fd00d2272746c520b32d958 10bd2410caf3fbbd4ec3c06923ff8fd2ba4a23dd 9141eff7de91485781734b7004fe051d27210fed a0c399ea79bfb42adfd7545e9063c9ee0a448c21 5e0864799fb163b3b303103ec25e8d07dae80486 17c4eb088c892ad1a5c10a1d9de868a425b94643 44c852249042556e1eb7cd1a3c36c150fe161329 8df6e477a03d554fb4250295de43b69d7c030622 b58a1cc20dbdeae1148a82c39499742b51e31f3d 054e85534f7a82df90ab09c731ba6b5631624643 734f6927564b3a0aecd4f77aed0427bd366957d7 172737631c50f0ffdbcd711a5b518b0225bea0e1 d8164f1eecc6bb73a56d9a87e4172142052ae3b7 cb26559a650c1cb3ffa2566ebce16a42c9768680 0a3cc5173fdd3353aef926d369013a2f0cb1a6a1 588ec239880f6d8359b9adacdf05a864e4a7226a 656588e8add2f954adbb9ea00c4981b9c82bc6ac f7137bbffe83a186a9085edeec1776d1d2ea6eea becfbae1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4c:e6:89:28:d8:8f:5c:fc:ba:c0:08:f5:22:9e:bb:42:09:bd:48:cc] modulus: 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 public exponent: 10001 ] 2022-05-19 17:56:43.791  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-19 17:56:43.792 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-19 17:56:43.793 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-19 17:56:43.794 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-19 17:56:43.794  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-19 17:56:43.794  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-19 17:56:43.794  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-19 17:56:43.795 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 17:56:43.795 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-19 17:56:43.795 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-19 17:56:43.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-19 17:56:43.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:56:43.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 17:56:43.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:56:44.029  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-19 17:56:44.029  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-19 17:56:44.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-19 17:56:44.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 17:56:44.031  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-19 17:56:44.031  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-19 17:56:44.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:56:44.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:56:44.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:56:44.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:56:44.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:56:44.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:56:44.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 17:56:44.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 17:56:44.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 17:56:44.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-19 17:56:44.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623172992346459899773106765601350291766553782567 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 19 12:59:51 UTC 2022 Final Date: Tue May 18 12:59:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:e5:ac:d8:96:e6:3b:05:18:96:e5:90:bc:8b:72:fb:23:d9:45:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b228421d67cf0aa8c80cabec4220acf07e3f1d0e 575d35e83d3962c65fd00d2272746c520b32d958 10bd2410caf3fbbd4ec3c06923ff8fd2ba4a23dd 9141eff7de91485781734b7004fe051d27210fed a0c399ea79bfb42adfd7545e9063c9ee0a448c21 5e0864799fb163b3b303103ec25e8d07dae80486 17c4eb088c892ad1a5c10a1d9de868a425b94643 44c852249042556e1eb7cd1a3c36c150fe161329 8df6e477a03d554fb4250295de43b69d7c030622 b58a1cc20dbdeae1148a82c39499742b51e31f3d 054e85534f7a82df90ab09c731ba6b5631624643 734f6927564b3a0aecd4f77aed0427bd366957d7 172737631c50f0ffdbcd711a5b518b0225bea0e1 d8164f1eecc6bb73a56d9a87e4172142052ae3b7 cb26559a650c1cb3ffa2566ebce16a42c9768680 0a3cc5173fdd3353aef926d369013a2f0cb1a6a1 588ec239880f6d8359b9adacdf05a864e4a7226a 656588e8add2f954adbb9ea00c4981b9c82bc6ac f7137bbffe83a186a9085edeec1776d1d2ea6eea becfbae1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:0a:63:54:dc:a7:ba:e3:5e:12:9c:e5:38:fb:be:44:77:62:81:3b] modulus: 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 public exponent: 10001 ] 2022-05-19 18:24:11.912  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-19 18:24:11.914 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-19 18:24:11.916 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-19 18:24:11.916 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-19 18:24:11.917  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-19 18:24:11.917  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-19 18:24:11.917  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-19 18:24:11.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 18:24:11.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-19 18:24:11.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-19 18:24:11.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-19 18:24:11.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 18:24:11.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 18:24:11.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 18:24:12.023  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-19 18:24:12.024  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-19 18:24:12.024 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-19 18:24:12.024 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 18:24:12.025  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-19 18:24:12.025  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-19 18:24:12.026 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 18:24:12.026 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 18:24:12.026 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 18:24:12.026 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 18:24:12.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 18:24:12.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 18:24:12.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 18:24:12.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 18:24:12.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 18:24:12.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-19 18:24:12.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623172992346459899773106765601350291766553782567 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 19 12:59:51 UTC 2022 Final Date: Tue May 18 12:59:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:e5:ac:d8:96:e6:3b:05:18:96:e5:90:bc:8b:72:fb:23:d9:45:80] modulus: b9fe5f3fc2eeff6a93ca088e42abd3dde3437c3336f5ad13d9aac3f3375381e82d143ab2679eba69c6e089361008e36affed8cb57c15fd17a54599c4133e4103209fbf3d388b1cb84804f5026bb0f3f3ed57f0283df801cd525a227524d15b991179e3f94833bcadb713e271ed75c07c17e3960d7d5dce72f9e3ff00cd42cf87611c9a65105b11a9c882b55972e13af82de360247bad76c2441c6618014c6cd104a947397b7cd8d7c82c889209e472fe91c0b76c58c49268117b2fb6e83072121256b611dc6cd1e3cf0059e9fe9be42367d9fa9edee8ab139c6a2a9d05baeb0b4f990e4bda83d5ea827d1971ebea5399c6838152aa47c291bf87c9de3ee22512f9df42ea56e75138f30e16884a4d7324b71c02a1bb5b9d98ba72008385abcdfd87dc2560e715399ce8f475916527db87bba93b214466da0e5d20ee87a8bb52b136ddaab8232e3edb11a0caf1bbf59faeeb1aacdbfafcf1769cd570ab38e7d8d6f62bdd01f8afd1d0d70514761199f0a27fd15edc867176a85d493cb3d4f5b91f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b228421d67cf0aa8c80cabec4220acf07e3f1d0e 575d35e83d3962c65fd00d2272746c520b32d958 10bd2410caf3fbbd4ec3c06923ff8fd2ba4a23dd 9141eff7de91485781734b7004fe051d27210fed a0c399ea79bfb42adfd7545e9063c9ee0a448c21 5e0864799fb163b3b303103ec25e8d07dae80486 17c4eb088c892ad1a5c10a1d9de868a425b94643 44c852249042556e1eb7cd1a3c36c150fe161329 8df6e477a03d554fb4250295de43b69d7c030622 b58a1cc20dbdeae1148a82c39499742b51e31f3d 054e85534f7a82df90ab09c731ba6b5631624643 734f6927564b3a0aecd4f77aed0427bd366957d7 172737631c50f0ffdbcd711a5b518b0225bea0e1 d8164f1eecc6bb73a56d9a87e4172142052ae3b7 cb26559a650c1cb3ffa2566ebce16a42c9768680 0a3cc5173fdd3353aef926d369013a2f0cb1a6a1 588ec239880f6d8359b9adacdf05a864e4a7226a 656588e8add2f954adbb9ea00c4981b9c82bc6ac f7137bbffe83a186a9085edeec1776d1d2ea6eea becfbae1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:db:d2:ae:7e:c5:e7:ab:77:6c:76:10:7d:80:52:ac:43:0a:4e:88] modulus: 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 public exponent: 10001 ] 2022-05-19 18:25:45.175  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-19 18:25:45.175 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-19 18:25:45.176 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-19 18:25:45.177 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-19 18:25:45.177  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-19 18:25:45.178  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-19 18:25:45.178  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-19 18:25:45.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-19 18:25:45.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-19 18:25:45.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-19 18:25:45.183 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-19 18:25:45.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 18:25:45.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-19 18:25:45.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 18:25:45.276  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-19 18:25:45.276  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-19 18:25:45.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-19 18:25:45.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-19 18:25:45.278  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-19 18:25:45.278  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-19 18:25:45.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 18:25:45.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 18:25:45.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 18:25:45.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 18:25:45.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 18:25:45.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 18:25:45.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-19 18:25:45.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-19 18:25:45.280 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-19 18:25:45.281 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-19 18:25:45.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 623172992346459899773106765601350291766553782567 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 19 12:59:51 UTC 2022 Final Date: Tue May 18 12:59:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:e5:ac:d8:96:e6:3b:05:18:96:e5:90:bc:8b:72:fb:23:d9:45:80] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b228421d67cf0aa8c80cabec4220acf07e3f1d0e 575d35e83d3962c65fd00d2272746c520b32d958 10bd2410caf3fbbd4ec3c06923ff8fd2ba4a23dd 9141eff7de91485781734b7004fe051d27210fed a0c399ea79bfb42adfd7545e9063c9ee0a448c21 5e0864799fb163b3b303103ec25e8d07dae80486 17c4eb088c892ad1a5c10a1d9de868a425b94643 44c852249042556e1eb7cd1a3c36c150fe161329 8df6e477a03d554fb4250295de43b69d7c030622 b58a1cc20dbdeae1148a82c39499742b51e31f3d 054e85534f7a82df90ab09c731ba6b5631624643 734f6927564b3a0aecd4f77aed0427bd366957d7 172737631c50f0ffdbcd711a5b518b0225bea0e1 d8164f1eecc6bb73a56d9a87e4172142052ae3b7 cb26559a650c1cb3ffa2566ebce16a42c9768680 0a3cc5173fdd3353aef926d369013a2f0cb1a6a1 588ec239880f6d8359b9adacdf05a864e4a7226a 656588e8add2f954adbb9ea00c4981b9c82bc6ac f7137bbffe83a186a9085edeec1776d1d2ea6eea becfbae1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4e:09:e1:c0:79:0f:86:3a:41:85:77:c8:3b:60:47:ec:40:3f:1f:d0] modulus: b668b67487cafba0efa16fc9e56bf556839cb18e42289bfba976b639a1ec4f7351ee9c54562e25f05cc7e8ba5b866e421a93090ecfac45a1d8913afdb3313816395d4963063221407ad3970325b3df6581257c9258ecf1d6e7b285b766eaa38bc662d1f2b336a090d4c6bb06f7567f37e243c0cdcca9ec273373466d6459237830a84177a8a3d8547419cb7e71a9617d8a16e6f0c1508252c1bd1c1ab5fcbce934ba4d0f745e6af6a29b6a0614ee7b5f7c4f340f4afcde08946de57b522f98e2de61494d5fe21c44ec22f62d1d6957645fb10241d0f71fdafc17822ab1aa17ce4001a296e9dc995603eecf6de8d03e1b41f4463b4613cb09fed4a1c8e198c61b public exponent: 10001 ]