2022-06-17 03:25:36,006 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-17 03:25:36,894 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-17 03:25:37.646  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 17, 2022 3:25:39 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 17, 2022 3:25:39 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 17, 2022 3:25:39 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 17, 2022 3:25:39 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-17 03:25:40.143 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-17 03:25:40.423  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-17 03:25:40.592  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-17 03:25:41.423 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-17 03:25:41.427 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-17 03:25:41.429 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-17 03:25:41.433 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-17 03:25:41.472 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-06-17 03:25:41.475 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-17 03:25:41.603 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-17 03:25:42.325 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 17, 2022 3:25:42 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-17 03:25:43.224  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.011 seconds (JVM running for 9.741) Jun 17, 2022 3:26:07 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-17 03:26:18.019  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-17 03:26:18.027 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-17 03:26:18.070 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-17 03:26:18.074 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-17 03:26:18.089  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-17 03:26:18.091  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-17 03:26:18.092  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-17 03:26:18.094 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-17 03:26:18.094 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 03:26:18.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-17 03:26:18.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-17 03:26:18.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-17 03:26:18.145 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-17 03:26:18.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 03:26:18.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 03:26:18.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 03:26:18.824  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-17 03:26:18.827  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-17 03:26:18.827 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-17 03:26:18.828 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 03:26:18.837  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-17 03:26:18.838  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-17 03:26:18.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 03:26:18.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 03:26:18.840 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 03:26:18.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 03:26:18.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 03:26:18.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 03:26:18.858 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 03:26:18.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 03:26:18.859 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 03:26:18.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-17 03:26:18.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 152723445309235083859019150739090646673350120003 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 17 03:22:59 UTC 2022 Final Date: Wed Jun 16 03:22:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8b:40:b6:bd:0b:05:56:4c:2d:0b:ea:8f:3e:8b:9e:8b:cf:46:5d:6d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5dec93ce1a1746408c8ad1925f79369fd80cd858 1526e898c1836942ddd43340048f7f0b6dbafff0 2ed4e336e5cc27c3a66c9a074768a754db234417 e2c29b699af23e252e85ca061411837c1d4500ba 4623818bc6287f238a8f62481c9a4604dd27b901 067f7e2f62aeba23d2ab03af93cfc5954debfdb8 5b9093636ccbbab82a4cfc6c18d66949365d1b70 7224234643e9c06a548ce4ed62a5c6396f5b5db2 3018bdbcef00d88366a45d9c6d384e73981ad225 41eef00000146fcd1d18ba251107291e30f6fdb4 1798f04bb6e82a297d90de85643a3b9e15251bde 557375853b6a8a353249ea2d72d9efb83e5fc5a2 3e714fb51cf96af05e88402ac733035d7e709179 a85beb5032da0ef7313264e2da0334c998e7fa84 0581fabe5f76af9f9e9a3a061d4f053dc55fc773 8029d1b29162c988392bcf1b47f814c881a975f3 b5ac1e6a351dd663f52608c30fda288df833981f 97c33d712eeb8f4d38a869ae1be32828f669f565 9408d123f3ba222380bab72ac5804d6b29e2fec9 9792a3ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:b9:46:2f:e2:da:db:9a:74:ee:0c:43:e4:45:6f:64:cc:fa:06:35] modulus: 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 public exponent: 10001 ] 2022-06-17 04:43:30.286  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-17 04:43:30.290 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-17 04:43:30.293 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-17 04:43:30.295 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-17 04:43:30.296  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-17 04:43:30.297  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-17 04:43:30.298  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-17 04:43:30.298 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-17 04:43:30.299 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-17 04:43:30.300 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-17 04:43:30.321 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-17 04:43:30.324 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 04:43:30.324 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 04:43:30.325 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 04:43:30.593  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-17 04:43:30.594  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-17 04:43:30.594 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-17 04:43:30.595 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 04:43:30.598  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-17 04:43:30.598  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-17 04:43:30.598 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:43:30.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:43:30.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:43:30.600 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:43:30.601 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:43:30.601 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:43:30.602 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:43:30.602 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:43:30.602 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:43:30.603 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-17 04:43:30.609 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 152723445309235083859019150739090646673350120003 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 17 03:22:59 UTC 2022 Final Date: Wed Jun 16 03:22:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8b:40:b6:bd:0b:05:56:4c:2d:0b:ea:8f:3e:8b:9e:8b:cf:46:5d:6d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5dec93ce1a1746408c8ad1925f79369fd80cd858 1526e898c1836942ddd43340048f7f0b6dbafff0 2ed4e336e5cc27c3a66c9a074768a754db234417 e2c29b699af23e252e85ca061411837c1d4500ba 4623818bc6287f238a8f62481c9a4604dd27b901 067f7e2f62aeba23d2ab03af93cfc5954debfdb8 5b9093636ccbbab82a4cfc6c18d66949365d1b70 7224234643e9c06a548ce4ed62a5c6396f5b5db2 3018bdbcef00d88366a45d9c6d384e73981ad225 41eef00000146fcd1d18ba251107291e30f6fdb4 1798f04bb6e82a297d90de85643a3b9e15251bde 557375853b6a8a353249ea2d72d9efb83e5fc5a2 3e714fb51cf96af05e88402ac733035d7e709179 a85beb5032da0ef7313264e2da0334c998e7fa84 0581fabe5f76af9f9e9a3a061d4f053dc55fc773 8029d1b29162c988392bcf1b47f814c881a975f3 b5ac1e6a351dd663f52608c30fda288df833981f 97c33d712eeb8f4d38a869ae1be32828f669f565 9408d123f3ba222380bab72ac5804d6b29e2fec9 9792a3ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [55:99:31:fa:1d:66:56:13:dc:58:2c:18:60:ee:94:3a:fc:e1:0a:0e] modulus: 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 public exponent: 10001 ] 2022-06-17 04:45:18.152  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-17 04:45:18.156 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-17 04:45:18.161 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-17 04:45:18.163 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-17 04:45:18.164  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-17 04:45:18.165  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-17 04:45:18.166  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-17 04:45:18.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-17 04:45:18.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-17 04:45:18.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-17 04:45:18.177 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-17 04:45:18.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 04:45:18.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 04:45:18.180 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 04:45:18.523  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-17 04:45:18.524  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-17 04:45:18.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-17 04:45:18.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 04:45:18.528  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-17 04:45:18.528  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-17 04:45:18.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:45:18.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:45:18.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:45:18.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:45:18.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:45:18.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:45:18.532 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:45:18.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:45:18.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:45:18.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-17 04:45:18.539 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 152723445309235083859019150739090646673350120003 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 17 03:22:59 UTC 2022 Final Date: Wed Jun 16 03:22:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8b:40:b6:bd:0b:05:56:4c:2d:0b:ea:8f:3e:8b:9e:8b:cf:46:5d:6d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5dec93ce1a1746408c8ad1925f79369fd80cd858 1526e898c1836942ddd43340048f7f0b6dbafff0 2ed4e336e5cc27c3a66c9a074768a754db234417 e2c29b699af23e252e85ca061411837c1d4500ba 4623818bc6287f238a8f62481c9a4604dd27b901 067f7e2f62aeba23d2ab03af93cfc5954debfdb8 5b9093636ccbbab82a4cfc6c18d66949365d1b70 7224234643e9c06a548ce4ed62a5c6396f5b5db2 3018bdbcef00d88366a45d9c6d384e73981ad225 41eef00000146fcd1d18ba251107291e30f6fdb4 1798f04bb6e82a297d90de85643a3b9e15251bde 557375853b6a8a353249ea2d72d9efb83e5fc5a2 3e714fb51cf96af05e88402ac733035d7e709179 a85beb5032da0ef7313264e2da0334c998e7fa84 0581fabe5f76af9f9e9a3a061d4f053dc55fc773 8029d1b29162c988392bcf1b47f814c881a975f3 b5ac1e6a351dd663f52608c30fda288df833981f 97c33d712eeb8f4d38a869ae1be32828f669f565 9408d123f3ba222380bab72ac5804d6b29e2fec9 9792a3ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:ba:67:e9:05:71:62:2e:c9:09:66:30:7f:4f:05:84:71:69:62:3c] modulus: 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 public exponent: 10001 ] 2022-06-17 04:46:35.784  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-17 04:46:35.788 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-17 04:46:35.790 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-17 04:46:35.790 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-17 04:46:35.793  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-17 04:46:35.794  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-17 04:46:35.794  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-17 04:46:35.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-17 04:46:35.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-17 04:46:35.796 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-17 04:46:35.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-17 04:46:35.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 04:46:35.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 04:46:35.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 04:46:36.048  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-17 04:46:36.050  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-17 04:46:36.051 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-17 04:46:36.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 04:46:36.056  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-17 04:46:36.057  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-17 04:46:36.059 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:46:36.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:46:36.061 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:46:36.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:46:36.065 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:46:36.065 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:46:36.068 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:46:36.069 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:46:36.069 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:46:36.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-17 04:46:36.076 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 152723445309235083859019150739090646673350120003 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 17 03:22:59 UTC 2022 Final Date: Wed Jun 16 03:22:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8b:40:b6:bd:0b:05:56:4c:2d:0b:ea:8f:3e:8b:9e:8b:cf:46:5d:6d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5dec93ce1a1746408c8ad1925f79369fd80cd858 1526e898c1836942ddd43340048f7f0b6dbafff0 2ed4e336e5cc27c3a66c9a074768a754db234417 e2c29b699af23e252e85ca061411837c1d4500ba 4623818bc6287f238a8f62481c9a4604dd27b901 067f7e2f62aeba23d2ab03af93cfc5954debfdb8 5b9093636ccbbab82a4cfc6c18d66949365d1b70 7224234643e9c06a548ce4ed62a5c6396f5b5db2 3018bdbcef00d88366a45d9c6d384e73981ad225 41eef00000146fcd1d18ba251107291e30f6fdb4 1798f04bb6e82a297d90de85643a3b9e15251bde 557375853b6a8a353249ea2d72d9efb83e5fc5a2 3e714fb51cf96af05e88402ac733035d7e709179 a85beb5032da0ef7313264e2da0334c998e7fa84 0581fabe5f76af9f9e9a3a061d4f053dc55fc773 8029d1b29162c988392bcf1b47f814c881a975f3 b5ac1e6a351dd663f52608c30fda288df833981f 97c33d712eeb8f4d38a869ae1be32828f669f565 9408d123f3ba222380bab72ac5804d6b29e2fec9 9792a3ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:70:67:e7:50:e9:e7:41:fe:7b:11:93:42:b5:8a:62:9b:fa:bc:16] modulus: bc51a854025d5fc5fa62a198400281fa670bae8527c25f2b6aea87c45bfc4b1679d5ae5408e1ca2f37b65a2b635b5883b542087c8ea2e8812840b59e3bc846487793122017b37518186e262fddb6f9ad4c0c509012f687491a51ab5ff20c8ba6b011293e6292e49c5c8242a695502c3e029f4707fa40f1e903989439668aad96054b9d27f8c4ad18514b7f245db6ebad21ea2e612ae39a2fc15ab10f2234e6a874526405bd7ca39a4f0866ff70ce26041b20a9a33f5c5e044547b30fd6d7dc4b6c4ef2977bba9a642e7bdfd93a2314820ba7cf3ca80fbde4388b2d914139e573f78a37f8b15efa6307287fd49a6b054da7df54137f4be5d7cb8fce005af0f44f public exponent: 10001 ] 2022-06-17 04:48:30.500  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-17 04:48:30.502 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-17 04:48:30.506 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-17 04:48:30.507 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-17 04:48:30.508  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-17 04:48:30.509  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-17 04:48:30.510  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-17 04:48:30.511 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-17 04:48:30.513 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-17 04:48:30.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-17 04:48:30.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-17 04:48:30.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 04:48:30.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 04:48:30.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 04:48:30.705  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-17 04:48:30.706  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-17 04:48:30.706 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-17 04:48:30.707 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 04:48:30.708  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-17 04:48:30.709  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-17 04:48:30.709 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:48:30.710 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:48:30.710 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:48:30.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:48:30.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:48:30.711 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:48:30.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:48:30.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:48:30.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:48:30.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-17 04:48:30.717 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 152723445309235083859019150739090646673350120003 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 17 03:22:59 UTC 2022 Final Date: Wed Jun 16 03:22:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8b:40:b6:bd:0b:05:56:4c:2d:0b:ea:8f:3e:8b:9e:8b:cf:46:5d:6d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5dec93ce1a1746408c8ad1925f79369fd80cd858 1526e898c1836942ddd43340048f7f0b6dbafff0 2ed4e336e5cc27c3a66c9a074768a754db234417 e2c29b699af23e252e85ca061411837c1d4500ba 4623818bc6287f238a8f62481c9a4604dd27b901 067f7e2f62aeba23d2ab03af93cfc5954debfdb8 5b9093636ccbbab82a4cfc6c18d66949365d1b70 7224234643e9c06a548ce4ed62a5c6396f5b5db2 3018bdbcef00d88366a45d9c6d384e73981ad225 41eef00000146fcd1d18ba251107291e30f6fdb4 1798f04bb6e82a297d90de85643a3b9e15251bde 557375853b6a8a353249ea2d72d9efb83e5fc5a2 3e714fb51cf96af05e88402ac733035d7e709179 a85beb5032da0ef7313264e2da0334c998e7fa84 0581fabe5f76af9f9e9a3a061d4f053dc55fc773 8029d1b29162c988392bcf1b47f814c881a975f3 b5ac1e6a351dd663f52608c30fda288df833981f 97c33d712eeb8f4d38a869ae1be32828f669f565 9408d123f3ba222380bab72ac5804d6b29e2fec9 9792a3ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [33:4b:41:50:f3:9a:e8:26:a2:82:95:9e:97:f7:e3:65:7a:98:99:b0] modulus: f972ee0be8cd1d0ac12f4ff32d402a634a94774705f05c6fb1e8175d932d5fd126c19030510d5a95eb685bdb2558eb2e8740a9944bab5f944d2501d2370415af10ad554245f505e22878b27f38ab8efb9f5f1460a2b70f5a99e55b5d133cf5b9009a479da892e16a5106f03965f9f378aa7b30a591e4143400f4184bedabd23e6abe80f1e9f130aa6e1fdb1e21466090c71e9a8d0e9fb69f0e57c3b4db7c9d5bab8d7e726926faf3049bf5d5b5a58eeddefe81779b6d011b14144c997a3f87c6d57bd59372a381a4e9e57ff94a17c98fc4e0f75b958b405338967369b3e0edf1656c264d937658d9d3823df5a1511e1f003281cdf1ec7b38e135c5d9a52e3a5f public exponent: 10001 ] 2022-06-17 04:57:50.110  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-17 04:57:50.112 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-17 04:57:50.115 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-17 04:57:50.115 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-17 04:57:50.117  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-17 04:57:50.122  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-17 04:57:50.122  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-17 04:57:50.123 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-17 04:57:50.123 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-17 04:57:50.124 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-17 04:57:50.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-17 04:57:50.136 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 04:57:50.136 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 04:57:50.137 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 04:57:50.374  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-17 04:57:50.377  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-17 04:57:50.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-17 04:57:50.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 04:57:50.384  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-17 04:57:50.388  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-17 04:57:50.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:57:50.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:57:50.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:57:50.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:57:50.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:57:50.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:57:50.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 04:57:50.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 04:57:50.404 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 04:57:50.405 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-17 04:57:50.410 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 152723445309235083859019150739090646673350120003 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 17 03:22:59 UTC 2022 Final Date: Wed Jun 16 03:22:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8b:40:b6:bd:0b:05:56:4c:2d:0b:ea:8f:3e:8b:9e:8b:cf:46:5d:6d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5dec93ce1a1746408c8ad1925f79369fd80cd858 1526e898c1836942ddd43340048f7f0b6dbafff0 2ed4e336e5cc27c3a66c9a074768a754db234417 e2c29b699af23e252e85ca061411837c1d4500ba 4623818bc6287f238a8f62481c9a4604dd27b901 067f7e2f62aeba23d2ab03af93cfc5954debfdb8 5b9093636ccbbab82a4cfc6c18d66949365d1b70 7224234643e9c06a548ce4ed62a5c6396f5b5db2 3018bdbcef00d88366a45d9c6d384e73981ad225 41eef00000146fcd1d18ba251107291e30f6fdb4 1798f04bb6e82a297d90de85643a3b9e15251bde 557375853b6a8a353249ea2d72d9efb83e5fc5a2 3e714fb51cf96af05e88402ac733035d7e709179 a85beb5032da0ef7313264e2da0334c998e7fa84 0581fabe5f76af9f9e9a3a061d4f053dc55fc773 8029d1b29162c988392bcf1b47f814c881a975f3 b5ac1e6a351dd663f52608c30fda288df833981f 97c33d712eeb8f4d38a869ae1be32828f669f565 9408d123f3ba222380bab72ac5804d6b29e2fec9 9792a3ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:4a:4b:e4:bb:8d:5a:1f:13:d9:a6:02:7f:20:de:ae:46:cf:60:e3] modulus: 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 public exponent: 10001 ] 2022-06-17 05:03:02.560  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-17 05:03:02.563 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-17 05:03:02.565 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-17 05:03:02.566 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-17 05:03:02.567  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-17 05:03:02.568  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-17 05:03:02.568  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-17 05:03:02.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-17 05:03:02.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-17 05:03:02.570 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-17 05:03:02.575 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-17 05:03:02.576 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 05:03:02.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 05:03:02.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 05:03:02.798  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-17 05:03:02.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-17 05:03:02.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-17 05:03:02.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 05:03:02.802  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-17 05:03:02.803  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-17 05:03:02.803 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 05:03:02.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 05:03:02.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 05:03:02.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 05:03:02.806 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 05:03:02.806 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 05:03:02.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 05:03:02.808 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 05:03:02.808 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 05:03:02.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-17 05:03:02.814 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 152723445309235083859019150739090646673350120003 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 17 03:22:59 UTC 2022 Final Date: Wed Jun 16 03:22:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8b:40:b6:bd:0b:05:56:4c:2d:0b:ea:8f:3e:8b:9e:8b:cf:46:5d:6d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5dec93ce1a1746408c8ad1925f79369fd80cd858 1526e898c1836942ddd43340048f7f0b6dbafff0 2ed4e336e5cc27c3a66c9a074768a754db234417 e2c29b699af23e252e85ca061411837c1d4500ba 4623818bc6287f238a8f62481c9a4604dd27b901 067f7e2f62aeba23d2ab03af93cfc5954debfdb8 5b9093636ccbbab82a4cfc6c18d66949365d1b70 7224234643e9c06a548ce4ed62a5c6396f5b5db2 3018bdbcef00d88366a45d9c6d384e73981ad225 41eef00000146fcd1d18ba251107291e30f6fdb4 1798f04bb6e82a297d90de85643a3b9e15251bde 557375853b6a8a353249ea2d72d9efb83e5fc5a2 3e714fb51cf96af05e88402ac733035d7e709179 a85beb5032da0ef7313264e2da0334c998e7fa84 0581fabe5f76af9f9e9a3a061d4f053dc55fc773 8029d1b29162c988392bcf1b47f814c881a975f3 b5ac1e6a351dd663f52608c30fda288df833981f 97c33d712eeb8f4d38a869ae1be32828f669f565 9408d123f3ba222380bab72ac5804d6b29e2fec9 9792a3ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:15:79:4c:32:1a:f2:79:1f:94:e1:6d:fd:c9:e5:c3:fa:88:d0:af] modulus: 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 public exponent: 10001 ] 2022-06-17 05:03:22.348  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-17 05:03:22.351 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-17 05:03:22.353 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-17 05:03:22.355 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-17 05:03:22.355  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-17 05:03:22.356  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-17 05:03:22.356  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-17 05:03:22.356 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-17 05:03:22.357 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-17 05:03:22.357 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-17 05:03:22.363 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-17 05:03:22.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 05:03:22.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-17 05:03:22.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 05:03:22.673  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-17 05:03:22.674  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-17 05:03:22.674 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-17 05:03:22.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-17 05:03:22.676  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-17 05:03:22.677  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-17 05:03:22.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 05:03:22.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 05:03:22.679 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 05:03:22.680 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 05:03:22.681 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 05:03:22.681 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 05:03:22.702 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-17 05:03:22.702 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-17 05:03:22.703 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-17 05:03:22.704 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-17 05:03:22.713 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 152723445309235083859019150739090646673350120003 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 17 03:22:59 UTC 2022 Final Date: Wed Jun 16 03:22:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8b:40:b6:bd:0b:05:56:4c:2d:0b:ea:8f:3e:8b:9e:8b:cf:46:5d:6d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5dec93ce1a1746408c8ad1925f79369fd80cd858 1526e898c1836942ddd43340048f7f0b6dbafff0 2ed4e336e5cc27c3a66c9a074768a754db234417 e2c29b699af23e252e85ca061411837c1d4500ba 4623818bc6287f238a8f62481c9a4604dd27b901 067f7e2f62aeba23d2ab03af93cfc5954debfdb8 5b9093636ccbbab82a4cfc6c18d66949365d1b70 7224234643e9c06a548ce4ed62a5c6396f5b5db2 3018bdbcef00d88366a45d9c6d384e73981ad225 41eef00000146fcd1d18ba251107291e30f6fdb4 1798f04bb6e82a297d90de85643a3b9e15251bde 557375853b6a8a353249ea2d72d9efb83e5fc5a2 3e714fb51cf96af05e88402ac733035d7e709179 a85beb5032da0ef7313264e2da0334c998e7fa84 0581fabe5f76af9f9e9a3a061d4f053dc55fc773 8029d1b29162c988392bcf1b47f814c881a975f3 b5ac1e6a351dd663f52608c30fda288df833981f 97c33d712eeb8f4d38a869ae1be32828f669f565 9408d123f3ba222380bab72ac5804d6b29e2fec9 9792a3ab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:7e:5c:f4:cd:b6:74:a0:fe:61:e4:f8:ed:00:19:5a:32:7a:5c:ad] modulus: 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 public exponent: 10001 ]