2022-06-05 03:15:27,312 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-05 03:15:28,666 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-05 03:15:29.598  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 05, 2022 3:15:32 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 05, 2022 3:15:32 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 05, 2022 3:15:32 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 05, 2022 3:15:32 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-05 03:15:32.953 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-05 03:15:33.319  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-05 03:15:33.506  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-05 03:15:34.516 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-05 03:15:34.521 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-05 03:15:34.524 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-05 03:15:34.531 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-05 03:15:34.586 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-05 03:15:34.590 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-05 03:15:34.725 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-05 03:15:35.439 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 05, 2022 3:15:36 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-05 03:15:36.550  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 10.237 seconds (JVM running for 12.806) Jun 05, 2022 3:16:00 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-05 03:16:18.006  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-05 03:16:18.016 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-05 03:16:18.073 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-05 03:16:18.083 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 03:16:18.115  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-05 03:16:18.118  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-05 03:16:18.120  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-05 03:16:18.121 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-05 03:16:18.122 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 03:16:18.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-05 03:16:18.136 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-05 03:16:18.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-05 03:16:18.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-05 03:16:18.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 03:16:18.209 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 03:16:18.213 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 03:16:18.860  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-05 03:16:18.863  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-05 03:16:18.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-05 03:16:18.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 03:16:18.880  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-05 03:16:18.882  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-05 03:16:18.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 03:16:18.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 03:16:18.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 03:16:18.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 03:16:18.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 03:16:18.905 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 03:16:18.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 03:16:18.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 03:16:18.916 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 03:16:18.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 03:16:18.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 437011134633777779962630313950098352233974519356 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 03:12:59 UTC 2022 Final Date: Fri Jun 04 03:12:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:8a:90:68:a0:fd:68:f8:14:9e:f5:7e:66:3f:75:ae:f4:56:dd:2f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cb73010a74232bc79e959ec4117bc58ef8b71897 2c0abfbcb63a26cc7c387712a216ed2fa8416f42 cc92c8a474a8c6f4a622e6bafa038105fac4de9b 4ba23b830ffdf3457c0cce14518ac98ca7f15b2c 20820cd7e2624745415f311ab54972a487d984c7 b2129d5a6aa3609464c5d2eb693f9e1e5ad5915d c9c11294553c770589866fd46c47453f38815e1d d20168255f3bb7ef2d64a8f5dc432265624881e1 f994d13afedba03081b472cec90907b14c1cec26 a75a62d7294a6dfe733a27518ec506ba4d68d4bb ff9086c0bed359b724a28c0df7245885bc458588 750a8e7bd7df5065befb064dad0d49e40d015a60 f4e37f6276f3ffcfceb73312c0448c78c8f0db14 ccc03e16353e269be71e5c1f1e338a48a63a10b7 098b47b254f2784c60519d14737709490dc7416f f05d8cb12e8e9e4a619b1c2715de8886632d3652 61ac28b69188b39a034a6964d17838a0ce96de4f 02feeeff2c1c4eb028aa05ddfb63aeb0263f1214 b4539a24c8f4c3365ba50c34ad05f21bb8f34f36 0d8aefce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:0a:18:0e:ce:b3:d1:13:3f:92:f5:6f:26:bf:3e:eb:3f:f6:ca:70] modulus: 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 public exponent: 10001 ] 2022-06-05 04:49:19.284  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-05 04:49:19.288 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-05 04:49:19.292 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 04:49:19.294 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 04:49:19.295  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 04:49:19.296  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-05 04:49:19.297  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-05 04:49:19.299 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-05 04:49:19.300 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-05 04:49:19.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-05 04:49:19.313 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-05 04:49:19.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 04:49:19.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 04:49:19.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 04:49:19.545  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-05 04:49:19.547  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-05 04:49:19.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-05 04:49:19.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 04:49:19.550  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-05 04:49:19.551  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-05 04:49:19.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:49:19.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:49:19.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:49:19.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:49:19.554 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:49:19.554 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:49:19.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:49:19.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:49:19.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:49:19.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 04:49:19.571 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 437011134633777779962630313950098352233974519356 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 03:12:59 UTC 2022 Final Date: Fri Jun 04 03:12:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:8a:90:68:a0:fd:68:f8:14:9e:f5:7e:66:3f:75:ae:f4:56:dd:2f] modulus: d4c1d4ab7f8ef74d3c5d9a9cfa9fcf50e3a716a174517be892ec48ce014b83fe1019314245e6cf021a07af366c9cd2f25d9fd9e8a79569b4bc4b78a763861683b646141fcfc074f5fd679670fad5a82ee2d04066b7b01b479ccd175d80316804ce297f3c164a069f393f9586bec5a00feb03441d8bde04ad8b5f29c258073bd63df7d759c55af59b383d7cd858b19c19d7d28a95feabd9bf26bb98e172affdb1b738bdee06d700077c3750f5ca8d790c426dc844a556518fb0ea3a0c1af0e14af9d81087325c59ab507ce0172d471552876605fcd693e422c589fcd268d4f87ed8f5b63513a137aaaad3c6092084c1d6c88015f5493d365000e3e1a2cbd1e3e81e7e8318d46ef5ad247e50380ed2f09c31cbca1c75fd25b3dcbbe7647ac678f7f7bc6f15cd2b83924e70e8b1704857e96554863dfec358c22f23dcd903dd9854f98472ce772954bdad511d3256dab2b4aadfb62d9c54817a0a5d0783f67e6cd82aa2e0f044d39f07f78647a9071afddb8d5871a0a62de0552b010f636e7cf72f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cb73010a74232bc79e959ec4117bc58ef8b71897 2c0abfbcb63a26cc7c387712a216ed2fa8416f42 cc92c8a474a8c6f4a622e6bafa038105fac4de9b 4ba23b830ffdf3457c0cce14518ac98ca7f15b2c 20820cd7e2624745415f311ab54972a487d984c7 b2129d5a6aa3609464c5d2eb693f9e1e5ad5915d c9c11294553c770589866fd46c47453f38815e1d d20168255f3bb7ef2d64a8f5dc432265624881e1 f994d13afedba03081b472cec90907b14c1cec26 a75a62d7294a6dfe733a27518ec506ba4d68d4bb ff9086c0bed359b724a28c0df7245885bc458588 750a8e7bd7df5065befb064dad0d49e40d015a60 f4e37f6276f3ffcfceb73312c0448c78c8f0db14 ccc03e16353e269be71e5c1f1e338a48a63a10b7 098b47b254f2784c60519d14737709490dc7416f f05d8cb12e8e9e4a619b1c2715de8886632d3652 61ac28b69188b39a034a6964d17838a0ce96de4f 02feeeff2c1c4eb028aa05ddfb63aeb0263f1214 b4539a24c8f4c3365ba50c34ad05f21bb8f34f36 0d8aefce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:d1:19:6f:f2:e4:76:43:16:36:60:1b:c6:22:8d:d3:30:f5:2a:90] modulus: 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 public exponent: 10001 ] 2022-06-05 04:51:07.543  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-05 04:51:07.545 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-05 04:51:07.549 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-05 04:51:07.550 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 04:51:07.550  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-05 04:51:07.551  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-05 04:51:07.552  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-05 04:51:07.552 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-05 04:51:07.553 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-05 04:51:07.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-05 04:51:07.560 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-05 04:51:07.560 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 04:51:07.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 04:51:07.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 04:51:07.703  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-05 04:51:07.704  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-05 04:51:07.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-05 04:51:07.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 04:51:07.707  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-05 04:51:07.708  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-05 04:51:07.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:51:07.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:51:07.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:51:07.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:51:07.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:51:07.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:51:07.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:51:07.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:51:07.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:51:07.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 04:51:07.719 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 437011134633777779962630313950098352233974519356 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 03:12:59 UTC 2022 Final Date: Fri Jun 04 03:12:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:8a:90:68:a0:fd:68:f8:14:9e:f5:7e:66:3f:75:ae:f4:56:dd:2f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cb73010a74232bc79e959ec4117bc58ef8b71897 2c0abfbcb63a26cc7c387712a216ed2fa8416f42 cc92c8a474a8c6f4a622e6bafa038105fac4de9b 4ba23b830ffdf3457c0cce14518ac98ca7f15b2c 20820cd7e2624745415f311ab54972a487d984c7 b2129d5a6aa3609464c5d2eb693f9e1e5ad5915d c9c11294553c770589866fd46c47453f38815e1d d20168255f3bb7ef2d64a8f5dc432265624881e1 f994d13afedba03081b472cec90907b14c1cec26 a75a62d7294a6dfe733a27518ec506ba4d68d4bb ff9086c0bed359b724a28c0df7245885bc458588 750a8e7bd7df5065befb064dad0d49e40d015a60 f4e37f6276f3ffcfceb73312c0448c78c8f0db14 ccc03e16353e269be71e5c1f1e338a48a63a10b7 098b47b254f2784c60519d14737709490dc7416f f05d8cb12e8e9e4a619b1c2715de8886632d3652 61ac28b69188b39a034a6964d17838a0ce96de4f 02feeeff2c1c4eb028aa05ddfb63aeb0263f1214 b4539a24c8f4c3365ba50c34ad05f21bb8f34f36 0d8aefce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:07:13:ae:f7:02:8a:02:15:8d:43:a8:34:ae:7f:70:c6:c1:54:e3] modulus: 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 public exponent: 10001 ] 2022-06-05 04:52:21.418  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-05 04:52:21.419 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-05 04:52:21.421 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-05 04:52:21.421 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 04:52:21.422  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-05 04:52:21.424  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-05 04:52:21.424  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-05 04:52:21.425 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-05 04:52:21.425 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-05 04:52:21.426 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-05 04:52:21.434 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-05 04:52:21.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 04:52:21.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 04:52:21.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 04:52:21.573  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-05 04:52:21.574  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-05 04:52:21.575 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-05 04:52:21.575 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 04:52:21.578  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-05 04:52:21.579  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-05 04:52:21.580 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:52:21.580 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:52:21.580 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:52:21.581 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:52:21.581 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:52:21.582 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:52:21.582 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:52:21.583 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:52:21.583 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:52:21.584 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 04:52:21.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 437011134633777779962630313950098352233974519356 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 03:12:59 UTC 2022 Final Date: Fri Jun 04 03:12:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:8a:90:68:a0:fd:68:f8:14:9e:f5:7e:66:3f:75:ae:f4:56:dd:2f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cb73010a74232bc79e959ec4117bc58ef8b71897 2c0abfbcb63a26cc7c387712a216ed2fa8416f42 cc92c8a474a8c6f4a622e6bafa038105fac4de9b 4ba23b830ffdf3457c0cce14518ac98ca7f15b2c 20820cd7e2624745415f311ab54972a487d984c7 b2129d5a6aa3609464c5d2eb693f9e1e5ad5915d c9c11294553c770589866fd46c47453f38815e1d d20168255f3bb7ef2d64a8f5dc432265624881e1 f994d13afedba03081b472cec90907b14c1cec26 a75a62d7294a6dfe733a27518ec506ba4d68d4bb ff9086c0bed359b724a28c0df7245885bc458588 750a8e7bd7df5065befb064dad0d49e40d015a60 f4e37f6276f3ffcfceb73312c0448c78c8f0db14 ccc03e16353e269be71e5c1f1e338a48a63a10b7 098b47b254f2784c60519d14737709490dc7416f f05d8cb12e8e9e4a619b1c2715de8886632d3652 61ac28b69188b39a034a6964d17838a0ce96de4f 02feeeff2c1c4eb028aa05ddfb63aeb0263f1214 b4539a24c8f4c3365ba50c34ad05f21bb8f34f36 0d8aefce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:47:c3:5b:0b:d0:4c:7e:ae:99:08:56:2f:2d:b8:bc:ac:d0:68:23] modulus: 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 public exponent: 10001 ] 2022-06-05 04:54:34.032  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-05 04:54:34.033 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-05 04:54:34.035 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 04:54:34.036 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 04:54:34.037  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-05 04:54:34.038  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-05 04:54:34.039  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-05 04:54:34.039 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-05 04:54:34.040 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-05 04:54:34.040 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-05 04:54:34.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-05 04:54:34.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 04:54:34.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 04:54:34.050 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 04:54:34.219  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-05 04:54:34.221  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-05 04:54:34.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-05 04:54:34.222 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 04:54:34.226  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-05 04:54:34.227  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-05 04:54:34.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:54:34.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:54:34.230 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:54:34.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:54:34.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:54:34.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:54:34.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 04:54:34.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 04:54:34.235 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 04:54:34.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 04:54:34.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 437011134633777779962630313950098352233974519356 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 03:12:59 UTC 2022 Final Date: Fri Jun 04 03:12:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:8a:90:68:a0:fd:68:f8:14:9e:f5:7e:66:3f:75:ae:f4:56:dd:2f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cb73010a74232bc79e959ec4117bc58ef8b71897 2c0abfbcb63a26cc7c387712a216ed2fa8416f42 cc92c8a474a8c6f4a622e6bafa038105fac4de9b 4ba23b830ffdf3457c0cce14518ac98ca7f15b2c 20820cd7e2624745415f311ab54972a487d984c7 b2129d5a6aa3609464c5d2eb693f9e1e5ad5915d c9c11294553c770589866fd46c47453f38815e1d d20168255f3bb7ef2d64a8f5dc432265624881e1 f994d13afedba03081b472cec90907b14c1cec26 a75a62d7294a6dfe733a27518ec506ba4d68d4bb ff9086c0bed359b724a28c0df7245885bc458588 750a8e7bd7df5065befb064dad0d49e40d015a60 f4e37f6276f3ffcfceb73312c0448c78c8f0db14 ccc03e16353e269be71e5c1f1e338a48a63a10b7 098b47b254f2784c60519d14737709490dc7416f f05d8cb12e8e9e4a619b1c2715de8886632d3652 61ac28b69188b39a034a6964d17838a0ce96de4f 02feeeff2c1c4eb028aa05ddfb63aeb0263f1214 b4539a24c8f4c3365ba50c34ad05f21bb8f34f36 0d8aefce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:ae:d5:aa:a1:a2:47:02:c8:38:ba:8f:ce:22:0a:d6:9e:40:a6:ee] modulus: dd07c32cd5618fb184d8735e7b552cf5f0f77e168ae1056365b411b719c27cdde54c697ab7bfbf7de62efca083861343d123017683397fb264ef759e2daaf01c3a5350bc7d39daea7975f1b3be8b7e71f82742cf57fc21560c60ece57aa81a56c2a26af4653c3e823d1ac57ea516d3fc977d5158a86cb47a588a672b7ea17d7583de77332b9171506d7755f3982308f86636709ae94d6f91835e84315e9c53ec86c0fcae69b0b807a890a7dffc4a50d5e3c81b423440cfe7ec209807db7da2a23573944c6be02dd82058654fa708ab2b34ea334689f47ab2ca1647293b5ee815d8d5c68143bfd5487d727167d18f0ee5385ae13fc30ad88fc633fd93c46dd523 public exponent: 10001 ] 2022-06-05 05:05:53.775  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-05 05:05:53.779 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-05 05:05:53.783 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-05 05:05:53.784 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 05:05:53.785  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-05 05:05:53.786  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-05 05:05:53.787  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-05 05:05:53.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-05 05:05:53.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-05 05:05:53.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-05 05:05:53.798 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-05 05:05:53.800 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 05:05:53.800 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 05:05:53.801 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 05:05:53.987  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-05 05:05:53.988  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-05 05:05:53.989 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-05 05:05:53.990 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 05:05:53.992  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-05 05:05:53.993  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-05 05:05:53.993 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:05:53.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:05:53.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:05:53.995 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:05:53.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:05:53.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:05:53.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:05:53.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:05:53.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:05:54.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 05:05:54.008 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 437011134633777779962630313950098352233974519356 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 03:12:59 UTC 2022 Final Date: Fri Jun 04 03:12:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:8a:90:68:a0:fd:68:f8:14:9e:f5:7e:66:3f:75:ae:f4:56:dd:2f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cb73010a74232bc79e959ec4117bc58ef8b71897 2c0abfbcb63a26cc7c387712a216ed2fa8416f42 cc92c8a474a8c6f4a622e6bafa038105fac4de9b 4ba23b830ffdf3457c0cce14518ac98ca7f15b2c 20820cd7e2624745415f311ab54972a487d984c7 b2129d5a6aa3609464c5d2eb693f9e1e5ad5915d c9c11294553c770589866fd46c47453f38815e1d d20168255f3bb7ef2d64a8f5dc432265624881e1 f994d13afedba03081b472cec90907b14c1cec26 a75a62d7294a6dfe733a27518ec506ba4d68d4bb ff9086c0bed359b724a28c0df7245885bc458588 750a8e7bd7df5065befb064dad0d49e40d015a60 f4e37f6276f3ffcfceb73312c0448c78c8f0db14 ccc03e16353e269be71e5c1f1e338a48a63a10b7 098b47b254f2784c60519d14737709490dc7416f f05d8cb12e8e9e4a619b1c2715de8886632d3652 61ac28b69188b39a034a6964d17838a0ce96de4f 02feeeff2c1c4eb028aa05ddfb63aeb0263f1214 b4539a24c8f4c3365ba50c34ad05f21bb8f34f36 0d8aefce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [96:6c:a2:07:81:74:b7:04:f6:b5:6a:df:53:37:7d:19:7d:c9:7c:0d] modulus: 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 public exponent: 10001 ] 2022-06-05 05:10:56.720  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-05 05:10:56.724 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-05 05:10:56.727 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-05 05:10:56.729 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 05:10:56.730  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-05 05:10:56.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-05 05:10:56.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-05 05:10:56.732 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-05 05:10:56.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-05 05:10:56.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-05 05:10:56.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-05 05:10:56.743 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 05:10:56.743 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 05:10:56.744 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 05:10:56.910  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-05 05:10:56.911  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-05 05:10:56.912 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-05 05:10:56.912 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 05:10:56.913  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-05 05:10:56.914  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-05 05:10:56.914 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:10:56.915 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:10:56.916 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:10:56.916 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:10:56.917 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:10:56.917 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:10:56.918 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:10:56.919 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:10:56.919 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:10:56.920 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 05:10:56.926 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 437011134633777779962630313950098352233974519356 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 03:12:59 UTC 2022 Final Date: Fri Jun 04 03:12:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:8a:90:68:a0:fd:68:f8:14:9e:f5:7e:66:3f:75:ae:f4:56:dd:2f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cb73010a74232bc79e959ec4117bc58ef8b71897 2c0abfbcb63a26cc7c387712a216ed2fa8416f42 cc92c8a474a8c6f4a622e6bafa038105fac4de9b 4ba23b830ffdf3457c0cce14518ac98ca7f15b2c 20820cd7e2624745415f311ab54972a487d984c7 b2129d5a6aa3609464c5d2eb693f9e1e5ad5915d c9c11294553c770589866fd46c47453f38815e1d d20168255f3bb7ef2d64a8f5dc432265624881e1 f994d13afedba03081b472cec90907b14c1cec26 a75a62d7294a6dfe733a27518ec506ba4d68d4bb ff9086c0bed359b724a28c0df7245885bc458588 750a8e7bd7df5065befb064dad0d49e40d015a60 f4e37f6276f3ffcfceb73312c0448c78c8f0db14 ccc03e16353e269be71e5c1f1e338a48a63a10b7 098b47b254f2784c60519d14737709490dc7416f f05d8cb12e8e9e4a619b1c2715de8886632d3652 61ac28b69188b39a034a6964d17838a0ce96de4f 02feeeff2c1c4eb028aa05ddfb63aeb0263f1214 b4539a24c8f4c3365ba50c34ad05f21bb8f34f36 0d8aefce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:e3:95:03:35:96:17:29:aa:d2:1a:e3:b5:49:9d:85:8d:c4:7f:3f] modulus: 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 public exponent: 10001 ] 2022-06-05 05:11:14.345  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-05 05:11:14.346 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-05 05:11:14.348 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-05 05:11:14.349 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-05 05:11:14.349  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-05 05:11:14.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-05 05:11:14.351  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-05 05:11:14.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-05 05:11:14.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-05 05:11:14.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-05 05:11:14.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-05 05:11:14.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 05:11:14.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-05 05:11:14.360 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 05:11:14.496  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-05 05:11:14.496  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-05 05:11:14.497 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-05 05:11:14.497 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-05 05:11:14.499  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-05 05:11:14.500  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-05 05:11:14.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:11:14.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:11:14.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:11:14.502 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:11:14.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:11:14.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:11:14.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-05 05:11:14.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-05 05:11:14.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-05 05:11:14.507 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-05 05:11:14.513 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 437011134633777779962630313950098352233974519356 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jun 05 03:12:59 UTC 2022 Final Date: Fri Jun 04 03:12:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:8a:90:68:a0:fd:68:f8:14:9e:f5:7e:66:3f:75:ae:f4:56:dd:2f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cb73010a74232bc79e959ec4117bc58ef8b71897 2c0abfbcb63a26cc7c387712a216ed2fa8416f42 cc92c8a474a8c6f4a622e6bafa038105fac4de9b 4ba23b830ffdf3457c0cce14518ac98ca7f15b2c 20820cd7e2624745415f311ab54972a487d984c7 b2129d5a6aa3609464c5d2eb693f9e1e5ad5915d c9c11294553c770589866fd46c47453f38815e1d d20168255f3bb7ef2d64a8f5dc432265624881e1 f994d13afedba03081b472cec90907b14c1cec26 a75a62d7294a6dfe733a27518ec506ba4d68d4bb ff9086c0bed359b724a28c0df7245885bc458588 750a8e7bd7df5065befb064dad0d49e40d015a60 f4e37f6276f3ffcfceb73312c0448c78c8f0db14 ccc03e16353e269be71e5c1f1e338a48a63a10b7 098b47b254f2784c60519d14737709490dc7416f f05d8cb12e8e9e4a619b1c2715de8886632d3652 61ac28b69188b39a034a6964d17838a0ce96de4f 02feeeff2c1c4eb028aa05ddfb63aeb0263f1214 b4539a24c8f4c3365ba50c34ad05f21bb8f34f36 0d8aefce Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:aa:cf:41:17:7d:cd:64:a1:f1:87:e2:e3:73:85:c4:76:46:a4:0e] modulus: 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 public exponent: 10001 ]