2022-05-28 03:06:01,282 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-28 03:06:02,031 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-28 03:06:02.738  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default May 28, 2022 3:06:04 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 28, 2022 3:06:04 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 28, 2022 3:06:04 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 28, 2022 3:06:04 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-28 03:06:04.631 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-28 03:06:04.823  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-05-28 03:06:04.934  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-28 03:06:05.513 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-28 03:06:05.515 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-05-28 03:06:05.516 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-28 03:06:05.518 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-28 03:06:05.545 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-28 03:06:05.548 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-28 03:06:05.640 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-05-28 03:06:06.131 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 28, 2022 3:06:06 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-28 03:06:06.874  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 6.227 seconds (JVM running for 7.48) May 28, 2022 3:06:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-28 03:06:43.763  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-28 03:06:43.770 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-28 03:06:43.807 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-28 03:06:43.810 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-28 03:06:43.825  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-28 03:06:43.828  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-28 03:06:43.829  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-28 03:06:43.831 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-28 03:06:43.831 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 03:06:43.834 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-28 03:06:43.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-28 03:06:43.845 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-28 03:06:43.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-28 03:06:43.878 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 03:06:43.879 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 03:06:43.881 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 03:06:49.835  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-28 03:06:49.838  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-28 03:06:49.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-28 03:06:49.839 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 03:06:49.846  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-28 03:06:49.847  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-28 03:06:49.848 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 03:06:49.848 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 03:06:49.848 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 03:06:49.874 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 03:06:49.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 03:06:49.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 03:06:49.882 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 03:06:49.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 03:06:49.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 03:06:49.885 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-28 03:06:49.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 20346381152973336321103922375373899448416254695 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 28 03:03:40 UTC 2022 Final Date: Thu May 27 03:03:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0da84acd9a239325dc04566ad600f8d663c9b073 54ffae1be466e7d471d601dbb6bbbe555dfdbedb 7ee4d5b1b3616e27a606965053ef37d1b133bc6f 962365dbcb92e5aad28cbcf01d4623e83fc54581 6cbc810b762fa85bff4c10a0a33d1d980d61171c 8b631d82f5369fb091907bb9f407e6f23a899943 15cab8b7b0479f9c712da2c2698e9d40e54ac427 e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a da827115b00683479da34d1a0f0ae178efe959ee 68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2 0a96962151b8e8e74cd16ca8c614f59048313fed d844bb57ce52988c6643bf69079ec772fbacfe5e 67d7b867f78692dff87c7525f269d3a57a73bbce c9f7c72b9062c0df68781dfad92d36f5448252cb 67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3 140350a99cc66df20c6f9557801c10333e78d496 7a0ce182a10e67d8804c8149eed54c5beabc7a21 de3bc852188d6fec0d19f91f5845e442cbb9f68b 3feb632a2adff32716ad72305b0034fa9051fe96 06321365 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:8d:b5:5b:79:a1:15:31:c9:c0:2e:5c:ae:a2:26:3d:fe:39:4c:2b] modulus: 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 public exponent: 10001 ] 2022-05-28 04:19:57.351  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-28 04:19:57.353 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-28 04:19:57.355 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-28 04:19:57.359 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-28 04:19:57.359  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-28 04:19:57.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-28 04:19:57.367  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-28 04:19:57.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-28 04:19:57.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-28 04:19:57.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-28 04:19:57.388 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-28 04:19:57.389 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:19:57.390 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:19:57.390 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:19:57.581  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-28 04:19:57.583  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-28 04:19:57.584 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-28 04:19:57.584 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:19:57.589  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-28 04:19:57.590  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-28 04:19:57.590 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:19:57.591 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:19:57.591 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:19:57.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:19:57.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:19:57.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:19:57.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:19:57.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:19:57.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:19:57.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-28 04:19:57.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 20346381152973336321103922375373899448416254695 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 28 03:03:40 UTC 2022 Final Date: Thu May 27 03:03:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0da84acd9a239325dc04566ad600f8d663c9b073 54ffae1be466e7d471d601dbb6bbbe555dfdbedb 7ee4d5b1b3616e27a606965053ef37d1b133bc6f 962365dbcb92e5aad28cbcf01d4623e83fc54581 6cbc810b762fa85bff4c10a0a33d1d980d61171c 8b631d82f5369fb091907bb9f407e6f23a899943 15cab8b7b0479f9c712da2c2698e9d40e54ac427 e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a da827115b00683479da34d1a0f0ae178efe959ee 68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2 0a96962151b8e8e74cd16ca8c614f59048313fed d844bb57ce52988c6643bf69079ec772fbacfe5e 67d7b867f78692dff87c7525f269d3a57a73bbce c9f7c72b9062c0df68781dfad92d36f5448252cb 67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3 140350a99cc66df20c6f9557801c10333e78d496 7a0ce182a10e67d8804c8149eed54c5beabc7a21 de3bc852188d6fec0d19f91f5845e442cbb9f68b 3feb632a2adff32716ad72305b0034fa9051fe96 06321365 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:16:23:2c:2a:0d:ee:c0:7e:f4:1a:04:2f:8c:f2:cc:4d:59:2a:f3] modulus: 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 public exponent: 10001 ] 2022-05-28 04:21:30.731  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-28 04:21:30.734 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-28 04:21:30.736 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-28 04:21:30.737 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-28 04:21:30.737  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-28 04:21:30.738  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-28 04:21:30.738  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-28 04:21:30.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-28 04:21:30.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-28 04:21:30.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-28 04:21:30.747 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-28 04:21:30.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:21:30.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:21:30.748 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:21:30.942  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-28 04:21:30.943  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-28 04:21:30.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-28 04:21:30.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:21:30.945  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-28 04:21:30.946  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-28 04:21:30.946 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:21:30.946 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:21:30.947 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:21:30.947 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:21:30.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:21:30.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:21:30.953 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:21:30.954 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:21:30.954 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:21:30.956 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-28 04:21:30.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 20346381152973336321103922375373899448416254695 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 28 03:03:40 UTC 2022 Final Date: Thu May 27 03:03:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0da84acd9a239325dc04566ad600f8d663c9b073 54ffae1be466e7d471d601dbb6bbbe555dfdbedb 7ee4d5b1b3616e27a606965053ef37d1b133bc6f 962365dbcb92e5aad28cbcf01d4623e83fc54581 6cbc810b762fa85bff4c10a0a33d1d980d61171c 8b631d82f5369fb091907bb9f407e6f23a899943 15cab8b7b0479f9c712da2c2698e9d40e54ac427 e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a da827115b00683479da34d1a0f0ae178efe959ee 68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2 0a96962151b8e8e74cd16ca8c614f59048313fed d844bb57ce52988c6643bf69079ec772fbacfe5e 67d7b867f78692dff87c7525f269d3a57a73bbce c9f7c72b9062c0df68781dfad92d36f5448252cb 67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3 140350a99cc66df20c6f9557801c10333e78d496 7a0ce182a10e67d8804c8149eed54c5beabc7a21 de3bc852188d6fec0d19f91f5845e442cbb9f68b 3feb632a2adff32716ad72305b0034fa9051fe96 06321365 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:20:eb:a3:1a:8a:53:96:c9:5d:57:82:fc:e5:ea:43:5b:9f:a0:f1] modulus: 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 public exponent: 10001 ] 2022-05-28 04:22:19.096  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-28 04:22:19.097 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-28 04:22:19.098 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-28 04:22:19.099 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-28 04:22:19.099  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-28 04:22:19.100  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-28 04:22:19.100  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-28 04:22:19.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-28 04:22:19.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-28 04:22:19.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-28 04:22:19.103 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-28 04:22:19.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:22:19.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:22:19.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:22:19.232  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-28 04:22:19.233  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-28 04:22:19.233 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-28 04:22:19.234 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:22:19.235  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-28 04:22:19.235  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-28 04:22:19.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:22:19.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:22:19.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:22:19.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:22:19.237 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:22:19.237 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:22:19.237 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:22:19.238 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:22:19.238 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:22:19.238 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-28 04:22:19.241 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 20346381152973336321103922375373899448416254695 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 28 03:03:40 UTC 2022 Final Date: Thu May 27 03:03:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0da84acd9a239325dc04566ad600f8d663c9b073 54ffae1be466e7d471d601dbb6bbbe555dfdbedb 7ee4d5b1b3616e27a606965053ef37d1b133bc6f 962365dbcb92e5aad28cbcf01d4623e83fc54581 6cbc810b762fa85bff4c10a0a33d1d980d61171c 8b631d82f5369fb091907bb9f407e6f23a899943 15cab8b7b0479f9c712da2c2698e9d40e54ac427 e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a da827115b00683479da34d1a0f0ae178efe959ee 68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2 0a96962151b8e8e74cd16ca8c614f59048313fed d844bb57ce52988c6643bf69079ec772fbacfe5e 67d7b867f78692dff87c7525f269d3a57a73bbce c9f7c72b9062c0df68781dfad92d36f5448252cb 67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3 140350a99cc66df20c6f9557801c10333e78d496 7a0ce182a10e67d8804c8149eed54c5beabc7a21 de3bc852188d6fec0d19f91f5845e442cbb9f68b 3feb632a2adff32716ad72305b0034fa9051fe96 06321365 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bd:ce:ab:c0:d1:39:75:4a:bb:ae:37:59:26:56:16:ac:e3:26:5e:ad] modulus: beea057d94e15f804aa796a45bfc7c1d4267a12a6918933d6289c5277b3bedf72ccbadefaba571bca892dcd0c23887af8f1c257f6a03a102c974bdf5a1a59773e36e8705e2005ee8ca2b57e73457447a782ec5084d61f37c541d487610ea6480f25a81504abe3eab66be8798fe2ae673f9366edde9b6d5651999c5b6acd56c1a7a7dd81bbfafc5e9b2b5c11b6c63a7f39617b38e710bd62a9d8be339ed6d9092b0d8d32217f8f4794c18f396833c114e8a34d47b5c951b1af5fde31c55534769a08333d31c1a6d3f06a1f0d6571c8cd9babd40261c3e30641fac31cb975a8e7b322e0d0de0507dc3d7677a93159c02e7906184a4bb331ffd208d9e2b50ae83ef public exponent: 10001 ] 2022-05-28 04:24:30.767  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-28 04:24:30.768 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-28 04:24:30.769 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-28 04:24:30.770 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-28 04:24:30.770  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-28 04:24:30.771  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-28 04:24:30.772  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-28 04:24:30.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-28 04:24:30.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-28 04:24:30.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-28 04:24:30.776 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-28 04:24:30.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:24:30.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:24:30.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:24:30.955  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-28 04:24:30.956  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-28 04:24:30.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-28 04:24:30.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:24:30.959  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-28 04:24:30.959  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-28 04:24:30.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:24:30.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:24:30.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:24:30.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:24:30.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:24:30.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:24:30.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:24:30.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:24:30.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:24:30.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-28 04:24:30.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 20346381152973336321103922375373899448416254695 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 28 03:03:40 UTC 2022 Final Date: Thu May 27 03:03:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0da84acd9a239325dc04566ad600f8d663c9b073 54ffae1be466e7d471d601dbb6bbbe555dfdbedb 7ee4d5b1b3616e27a606965053ef37d1b133bc6f 962365dbcb92e5aad28cbcf01d4623e83fc54581 6cbc810b762fa85bff4c10a0a33d1d980d61171c 8b631d82f5369fb091907bb9f407e6f23a899943 15cab8b7b0479f9c712da2c2698e9d40e54ac427 e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a da827115b00683479da34d1a0f0ae178efe959ee 68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2 0a96962151b8e8e74cd16ca8c614f59048313fed d844bb57ce52988c6643bf69079ec772fbacfe5e 67d7b867f78692dff87c7525f269d3a57a73bbce c9f7c72b9062c0df68781dfad92d36f5448252cb 67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3 140350a99cc66df20c6f9557801c10333e78d496 7a0ce182a10e67d8804c8149eed54c5beabc7a21 de3bc852188d6fec0d19f91f5845e442cbb9f68b 3feb632a2adff32716ad72305b0034fa9051fe96 06321365 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:2f:48:54:b0:7a:8c:ca:e2:63:fd:23:e9:ad:0b:6d:bd:52:42:3c] modulus: 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 public exponent: 10001 ] 2022-05-28 04:34:36.026  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-28 04:34:36.028 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-28 04:34:36.030 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-28 04:34:36.030 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-28 04:34:36.031  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-28 04:34:36.031  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-28 04:34:36.032  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-28 04:34:36.032 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-28 04:34:36.032 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-28 04:34:36.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-28 04:34:36.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-28 04:34:36.038 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:34:36.038 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:34:36.039 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:34:36.200  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-28 04:34:36.201  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-28 04:34:36.201 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-28 04:34:36.202 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:34:36.203  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-28 04:34:36.204  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-28 04:34:36.204 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:34:36.204 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:34:36.205 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:34:36.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:34:36.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:34:36.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:34:36.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:34:36.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:34:36.208 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:34:36.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-28 04:34:36.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 20346381152973336321103922375373899448416254695 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 28 03:03:40 UTC 2022 Final Date: Thu May 27 03:03:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44] modulus: a29227f36251d152a9aa32c739333d4422f3794c87c5d425093e15c214535b129c562cfe4355cc7b1381c1b5b6368a3bc316806739927d3031dc2297a538fdd49e300a0addfa8944f0d30717f25c4cadc26870d1b1f7c8ef8a8f5bbbc1353671b07704386cf0ec517463a92182b4d144d84788b62c1a1c9a505e9c2114eb182ee5a16d5d3fee7c097a7cdf308e7ce7581b64cc847be747cbef0fc3190ea3fc6673e757413fa32d949fa2e8e043600aeac0b95489a089277eba6d2366ffeee96a6dd07c1c1be75288c05597ce302d24582e527826ec093526dfdff3d0081532036fd5d66d3a86890fc77765f5561788a1b623b514b28606909eb3d9170f681403d6a21ae62fe78666b77f5e5ce27fbd50ffdb9721aa52d4332ea70c97a2ce3b61286543598dcf31b2a88e445d4f6f5c9036da9c5cae84191278fb65efc71891df8e4832209faaece4b168aadd52922f233f62ba297f68d594df38e4b3af30d6eba4c5d5a8f8d8448b5c62ae3690ac0c7a70a04a458d9412adc19d377cf93fae65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0da84acd9a239325dc04566ad600f8d663c9b073 54ffae1be466e7d471d601dbb6bbbe555dfdbedb 7ee4d5b1b3616e27a606965053ef37d1b133bc6f 962365dbcb92e5aad28cbcf01d4623e83fc54581 6cbc810b762fa85bff4c10a0a33d1d980d61171c 8b631d82f5369fb091907bb9f407e6f23a899943 15cab8b7b0479f9c712da2c2698e9d40e54ac427 e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a da827115b00683479da34d1a0f0ae178efe959ee 68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2 0a96962151b8e8e74cd16ca8c614f59048313fed d844bb57ce52988c6643bf69079ec772fbacfe5e 67d7b867f78692dff87c7525f269d3a57a73bbce c9f7c72b9062c0df68781dfad92d36f5448252cb 67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3 140350a99cc66df20c6f9557801c10333e78d496 7a0ce182a10e67d8804c8149eed54c5beabc7a21 de3bc852188d6fec0d19f91f5845e442cbb9f68b 3feb632a2adff32716ad72305b0034fa9051fe96 06321365 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:db:c3:38:e1:d6:ae:65:41:55:8b:43:18:ff:c7:bb:24:41:79:15] modulus: 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 public exponent: 10001 ] 2022-05-28 04:40:20.155  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-28 04:40:20.157 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-28 04:40:20.160 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-28 04:40:20.161 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-28 04:40:20.169  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-28 04:40:20.169  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-28 04:40:20.170  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-28 04:40:20.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-28 04:40:20.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-28 04:40:20.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-28 04:40:20.175 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-28 04:40:20.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:40:20.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:40:20.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:40:20.337  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-28 04:40:20.338  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-28 04:40:20.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-28 04:40:20.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:40:20.341  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-28 04:40:20.341  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-28 04:40:20.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:40:20.342 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:40:20.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:40:20.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:40:20.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:40:20.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:40:20.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:40:20.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:40:20.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:40:20.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-28 04:40:20.352 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 20346381152973336321103922375373899448416254695 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 28 03:03:40 UTC 2022 Final Date: Thu May 27 03:03:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0da84acd9a239325dc04566ad600f8d663c9b073 54ffae1be466e7d471d601dbb6bbbe555dfdbedb 7ee4d5b1b3616e27a606965053ef37d1b133bc6f 962365dbcb92e5aad28cbcf01d4623e83fc54581 6cbc810b762fa85bff4c10a0a33d1d980d61171c 8b631d82f5369fb091907bb9f407e6f23a899943 15cab8b7b0479f9c712da2c2698e9d40e54ac427 e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a da827115b00683479da34d1a0f0ae178efe959ee 68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2 0a96962151b8e8e74cd16ca8c614f59048313fed d844bb57ce52988c6643bf69079ec772fbacfe5e 67d7b867f78692dff87c7525f269d3a57a73bbce c9f7c72b9062c0df68781dfad92d36f5448252cb 67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3 140350a99cc66df20c6f9557801c10333e78d496 7a0ce182a10e67d8804c8149eed54c5beabc7a21 de3bc852188d6fec0d19f91f5845e442cbb9f68b 3feb632a2adff32716ad72305b0034fa9051fe96 06321365 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:69:c2:f2:34:c8:1b:e0:3a:42:71:95:aa:9a:af:fd:0b:df:3a:08] modulus: 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 public exponent: 10001 ] 2022-05-28 04:40:33.176  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-28 04:40:33.178 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-28 04:40:33.179 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-28 04:40:33.180 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-28 04:40:33.180  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-28 04:40:33.181  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-28 04:40:33.181  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-28 04:40:33.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-28 04:40:33.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-28 04:40:33.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-28 04:40:33.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-28 04:40:33.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:40:33.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-28 04:40:33.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:40:33.314  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-28 04:40:33.315  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-28 04:40:33.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-28 04:40:33.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-28 04:40:33.316  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-28 04:40:33.317  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-28 04:40:33.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:40:33.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:40:33.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:40:33.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:40:33.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:40:33.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:40:33.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-28 04:40:33.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-28 04:40:33.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-28 04:40:33.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-28 04:40:33.323 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 20346381152973336321103922375373899448416254695 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 28 03:03:40 UTC 2022 Final Date: Thu May 27 03:03:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:2b:96:65:59:cc:0c:5f:59:6f:1d:6f:d6:9e:d2:18:c0:75:02:44] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0da84acd9a239325dc04566ad600f8d663c9b073 54ffae1be466e7d471d601dbb6bbbe555dfdbedb 7ee4d5b1b3616e27a606965053ef37d1b133bc6f 962365dbcb92e5aad28cbcf01d4623e83fc54581 6cbc810b762fa85bff4c10a0a33d1d980d61171c 8b631d82f5369fb091907bb9f407e6f23a899943 15cab8b7b0479f9c712da2c2698e9d40e54ac427 e9f58c12b97ef5e8d9977ff9a4a9847fd6a2b99a da827115b00683479da34d1a0f0ae178efe959ee 68ad9f53bac3b312ab0c1cabc9a46fd03a0924c2 0a96962151b8e8e74cd16ca8c614f59048313fed d844bb57ce52988c6643bf69079ec772fbacfe5e 67d7b867f78692dff87c7525f269d3a57a73bbce c9f7c72b9062c0df68781dfad92d36f5448252cb 67c2bad05bcc7c9d792ca9ebf952cb9ba83590d3 140350a99cc66df20c6f9557801c10333e78d496 7a0ce182a10e67d8804c8149eed54c5beabc7a21 de3bc852188d6fec0d19f91f5845e442cbb9f68b 3feb632a2adff32716ad72305b0034fa9051fe96 06321365 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:e7:d1:c5:4d:8d:f2:ac:8c:ca:4c:9d:67:6c:50:e8:81:96:51:46] modulus: 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 public exponent: 10001 ]