2022-09-22 02:39:34,184 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-09-22 02:39:35,093 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-09-22 02:39:35.955  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Sep 22, 2022 2:39:37 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Sep 22, 2022 2:39:37 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Sep 22, 2022 2:39:37 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Sep 22, 2022 2:39:38 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-09-22 02:39:38.650 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-09-22 02:39:38.939  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-09-22 02:39:39.105  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-09-22 02:39:39.884 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-09-22 02:39:39.888 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-09-22 02:39:39.889 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-09-22 02:39:39.894 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-09-22 02:39:39.935 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-09-22 02:39:39.939 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-09-22 02:39:40.057 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-09-22 02:39:40.589 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Sep 22, 2022 2:39:41 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-09-22 02:39:41.548  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.394 seconds (JVM running for 10.358) Sep 22, 2022 2:40:10 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-09-22 02:40:23.634  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-22 02:40:23.650 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-22 02:40:23.702 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-22 02:40:23.708 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-22 02:40:23.735  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-22 02:40:23.738  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-22 02:40:23.739  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-22 02:40:23.741 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-22 02:40:23.741 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 02:40:23.746 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-22 02:40:23.753 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-22 02:40:23.756 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-22 02:40:23.800 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-22 02:40:23.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 02:40:23.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 02:40:23.809 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 02:40:24.624  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-22 02:40:24.627  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-22 02:40:24.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-22 02:40:24.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 02:40:24.643  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-22 02:40:24.645  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-22 02:40:24.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 02:40:24.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 02:40:24.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 02:40:24.662 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 02:40:24.663 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 02:40:24.663 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 02:40:24.671 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 02:40:24.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 02:40:24.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 02:40:24.674 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-22 02:40:24.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120637864996508845249366366539834954528627475852 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 22 02:36:36 UTC 2022 Final Date: Tue Sep 21 02:36:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:b3:f1:65:2c:06:04:83:de:1b:cd:a8:c9:6f:8a:4b:7f:1a:2e:f5] modulus: d06d66ab8b7d34276d91b435a977e36603fb033084f766f0873f6a0625c30619a0e8f25d42b1350a649a5b24882140e19e72adf843e6c3eb3255bcef51a37fc331ebf9160e1d63e5f09171fb446e2243689c31c1ba12704d533efcdcf5dea5284e354ef9c42ac6163ae9acf646cf4314038076ddc73177d8e06dc082b9344249b6265f8e0c66e38edcce075e8897be92751bfc37bde55f717f1006fc8cc038c0f09a4d39707d8f2fa90b9aaf30e0c9ffd74e81f456164dda0e0417ae1e2f22f205aa54a2163455d7028c3ccac3ab15e9d23624ae7c74bbf8a0bb2bf9bbbd587380005cdf59127942441d193959bce2c5ad090a81915e41514e9b0db0cf6a0bce174d1478fdfd99f3a4dc3cfc8cf2b01fb1a5a2665fb64c52fe54e8a5a28fe4bbee98e48bb3f82ae2c4220b8c83c0f67e33a6bffe8b47a9a67b76db3367f5a32e64bde2a55336d1849dbeabce92a51e52d5fe5a90430f83c2574c5c6475ef9feafe9196d5a3d39016b9e7960d650a92b96675f32e68a73cccb42834ece3040bd1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b56fc519cbb9e04cb9816130af9ed153a113a43 12020de4c6c99ede871911c95a932dc6d8067282 74ef37bccf754e5f1172262e9096fd512de113d9 e94538cafc9984594adff342ba8c99f51f007d2d 2f8c7e8667dbc1a2d5ac8efee0f167ef7d4ee260 f91544ed73065c686ac4082f3953c09d1275c6bf 426037a79c8418bf3268d803fe453e28da60e0c0 51e9238a4df89141dcd05b4bce38c865350d43f8 b40d1a41d4bffa369ec1bf3f4cd4497959e200ee b8b054be01f8544b9429b6f03ac079eb35351b9a 0ce3d87dec175ea307d071d82aa64574264206c3 13641dfe3e540c05baf15212d79d1ef66f95701a 60f09a81c5f8c88ea97af75116c7de2d333f8354 b86a8f45d6a85f7b1f254092b457071638bbcc89 5f3e1424a9f5afd2c66109dad19419710c15c23e c407b7275a3949a1a87a22a1afc80690031b6f92 602df759e80a3c51342cbe1d25a57fb51ba6e8be 68046c6c18d20e656a6dedf1bd875ef8b47eb2bb 7663d2640c7b54cdc8cf36d575f1458cb79e22e9 0b9dbc14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:c5:8d:98:8f:2c:82:df:67:52:bd:6b:90:02:3e:a5:c0:86:d8:57] modulus: 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 public exponent: 10001 ] 2022-09-22 03:34:34.746  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-22 03:34:34.749 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-22 03:34:34.753 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-22 03:34:34.754 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-22 03:34:34.755  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-22 03:34:34.756  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-22 03:34:34.756  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-22 03:34:34.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-22 03:34:34.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-22 03:34:34.758 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-22 03:34:34.766 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-22 03:34:34.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:34:34.769 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:34:34.769 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:34:35.038  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-22 03:34:35.040  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-22 03:34:35.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-22 03:34:35.041 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:34:35.044  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-22 03:34:35.044  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-22 03:34:35.045 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:34:35.045 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:34:35.046 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:34:35.047 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:34:35.047 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:34:35.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:34:35.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:34:35.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:34:35.050 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:34:35.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-22 03:34:35.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120637864996508845249366366539834954528627475852 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 22 02:36:36 UTC 2022 Final Date: Tue Sep 21 02:36:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:b3:f1:65:2c:06:04:83:de:1b:cd:a8:c9:6f:8a:4b:7f:1a:2e:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b56fc519cbb9e04cb9816130af9ed153a113a43 12020de4c6c99ede871911c95a932dc6d8067282 74ef37bccf754e5f1172262e9096fd512de113d9 e94538cafc9984594adff342ba8c99f51f007d2d 2f8c7e8667dbc1a2d5ac8efee0f167ef7d4ee260 f91544ed73065c686ac4082f3953c09d1275c6bf 426037a79c8418bf3268d803fe453e28da60e0c0 51e9238a4df89141dcd05b4bce38c865350d43f8 b40d1a41d4bffa369ec1bf3f4cd4497959e200ee b8b054be01f8544b9429b6f03ac079eb35351b9a 0ce3d87dec175ea307d071d82aa64574264206c3 13641dfe3e540c05baf15212d79d1ef66f95701a 60f09a81c5f8c88ea97af75116c7de2d333f8354 b86a8f45d6a85f7b1f254092b457071638bbcc89 5f3e1424a9f5afd2c66109dad19419710c15c23e c407b7275a3949a1a87a22a1afc80690031b6f92 602df759e80a3c51342cbe1d25a57fb51ba6e8be 68046c6c18d20e656a6dedf1bd875ef8b47eb2bb 7663d2640c7b54cdc8cf36d575f1458cb79e22e9 0b9dbc14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:f0:c1:94:46:4f:b9:1e:bc:e6:c5:23:48:ad:7d:65:34:79:1d:80] modulus: d46c6fc2b277daf1887e5ed4c28c0b95e1432c2072382db295fbac56f0a4e3dd010593a7b220fccf8824d3f479cb72892e79859e3142c9ed4de6d4b0fd719dc80376cde7e54d9a94653c0567cb2a30327ec05c1b2d207dde01b294a56a9a1124ba5078f3b45ad71a79691021af14fd9d1d2a743e39a01d841a3d022bbb676debcd60f311622e7942a7324593b2e4b374e0a229756f3d70c1018ac72cba52095534b1226c6edbfcd0eb5cca4dd9f877ac89dcccdfd87c52c2f61e715bc1dc18cd4eee10d468c384289a8f6a27bed152756a67762b93a65f68d6b908d9346895256ba8432f696747c7cb35eb4b9e7aeccb0be3c4f06d00e0e97da0ec5d6e331e17 public exponent: 10001 ] 2022-09-22 03:36:22.810  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-22 03:36:22.813 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-22 03:36:22.816 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-22 03:36:22.817 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-22 03:36:22.818  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-22 03:36:22.819  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-22 03:36:22.819  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-22 03:36:22.820 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-22 03:36:22.820 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-22 03:36:22.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-22 03:36:22.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-22 03:36:22.834 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:36:22.834 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:36:22.835 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:36:23.053  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-22 03:36:23.055  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-22 03:36:23.055 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-22 03:36:23.056 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:36:23.064  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-22 03:36:23.065  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-22 03:36:23.068 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:36:23.069 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:36:23.070 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:36:23.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:36:23.081 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:36:23.082 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:36:23.084 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:36:23.085 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:36:23.085 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:36:23.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-22 03:36:23.099 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120637864996508845249366366539834954528627475852 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 22 02:36:36 UTC 2022 Final Date: Tue Sep 21 02:36:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:b3:f1:65:2c:06:04:83:de:1b:cd:a8:c9:6f:8a:4b:7f:1a:2e:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b56fc519cbb9e04cb9816130af9ed153a113a43 12020de4c6c99ede871911c95a932dc6d8067282 74ef37bccf754e5f1172262e9096fd512de113d9 e94538cafc9984594adff342ba8c99f51f007d2d 2f8c7e8667dbc1a2d5ac8efee0f167ef7d4ee260 f91544ed73065c686ac4082f3953c09d1275c6bf 426037a79c8418bf3268d803fe453e28da60e0c0 51e9238a4df89141dcd05b4bce38c865350d43f8 b40d1a41d4bffa369ec1bf3f4cd4497959e200ee b8b054be01f8544b9429b6f03ac079eb35351b9a 0ce3d87dec175ea307d071d82aa64574264206c3 13641dfe3e540c05baf15212d79d1ef66f95701a 60f09a81c5f8c88ea97af75116c7de2d333f8354 b86a8f45d6a85f7b1f254092b457071638bbcc89 5f3e1424a9f5afd2c66109dad19419710c15c23e c407b7275a3949a1a87a22a1afc80690031b6f92 602df759e80a3c51342cbe1d25a57fb51ba6e8be 68046c6c18d20e656a6dedf1bd875ef8b47eb2bb 7663d2640c7b54cdc8cf36d575f1458cb79e22e9 0b9dbc14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:0a:cc:79:a9:b0:99:9b:55:91:6b:85:e1:70:2b:14:7d:39:78:17] modulus: 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 public exponent: 10001 ] 2022-09-22 03:37:27.230  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-22 03:37:27.233 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-22 03:37:27.235 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-22 03:37:27.236 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-22 03:37:27.237  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-22 03:37:27.238  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-22 03:37:27.238  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-22 03:37:27.238 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-22 03:37:27.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-22 03:37:27.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-22 03:37:27.244 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-22 03:37:27.245 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:37:27.245 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:37:27.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:37:27.471  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-22 03:37:27.472  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-22 03:37:27.472 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-22 03:37:27.473 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:37:27.475  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-22 03:37:27.475  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-22 03:37:27.476 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:37:27.476 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:37:27.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:37:27.477 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:37:27.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:37:27.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:37:27.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:37:27.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:37:27.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:37:27.480 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-22 03:37:27.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120637864996508845249366366539834954528627475852 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 22 02:36:36 UTC 2022 Final Date: Tue Sep 21 02:36:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:b3:f1:65:2c:06:04:83:de:1b:cd:a8:c9:6f:8a:4b:7f:1a:2e:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b56fc519cbb9e04cb9816130af9ed153a113a43 12020de4c6c99ede871911c95a932dc6d8067282 74ef37bccf754e5f1172262e9096fd512de113d9 e94538cafc9984594adff342ba8c99f51f007d2d 2f8c7e8667dbc1a2d5ac8efee0f167ef7d4ee260 f91544ed73065c686ac4082f3953c09d1275c6bf 426037a79c8418bf3268d803fe453e28da60e0c0 51e9238a4df89141dcd05b4bce38c865350d43f8 b40d1a41d4bffa369ec1bf3f4cd4497959e200ee b8b054be01f8544b9429b6f03ac079eb35351b9a 0ce3d87dec175ea307d071d82aa64574264206c3 13641dfe3e540c05baf15212d79d1ef66f95701a 60f09a81c5f8c88ea97af75116c7de2d333f8354 b86a8f45d6a85f7b1f254092b457071638bbcc89 5f3e1424a9f5afd2c66109dad19419710c15c23e c407b7275a3949a1a87a22a1afc80690031b6f92 602df759e80a3c51342cbe1d25a57fb51ba6e8be 68046c6c18d20e656a6dedf1bd875ef8b47eb2bb 7663d2640c7b54cdc8cf36d575f1458cb79e22e9 0b9dbc14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:2c:1f:ab:27:e3:8b:00:a4:ab:4e:29:4d:83:99:e6:38:ad:7b:d0] modulus: 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 public exponent: 10001 ] 2022-09-22 03:39:58.294  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-22 03:39:58.296 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-22 03:39:58.298 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-22 03:39:58.299 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-22 03:39:58.300  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-22 03:39:58.302  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-22 03:39:58.303  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-22 03:39:58.304 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-22 03:39:58.305 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-22 03:39:58.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-22 03:39:58.311 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-22 03:39:58.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:39:58.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:39:58.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:39:58.482  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-22 03:39:58.483  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-22 03:39:58.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-22 03:39:58.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:39:58.485  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-22 03:39:58.486  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-22 03:39:58.486 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:39:58.487 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:39:58.487 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:39:58.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:39:58.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:39:58.488 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:39:58.489 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:39:58.489 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:39:58.490 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:39:58.491 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-22 03:39:58.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120637864996508845249366366539834954528627475852 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 22 02:36:36 UTC 2022 Final Date: Tue Sep 21 02:36:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:b3:f1:65:2c:06:04:83:de:1b:cd:a8:c9:6f:8a:4b:7f:1a:2e:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b56fc519cbb9e04cb9816130af9ed153a113a43 12020de4c6c99ede871911c95a932dc6d8067282 74ef37bccf754e5f1172262e9096fd512de113d9 e94538cafc9984594adff342ba8c99f51f007d2d 2f8c7e8667dbc1a2d5ac8efee0f167ef7d4ee260 f91544ed73065c686ac4082f3953c09d1275c6bf 426037a79c8418bf3268d803fe453e28da60e0c0 51e9238a4df89141dcd05b4bce38c865350d43f8 b40d1a41d4bffa369ec1bf3f4cd4497959e200ee b8b054be01f8544b9429b6f03ac079eb35351b9a 0ce3d87dec175ea307d071d82aa64574264206c3 13641dfe3e540c05baf15212d79d1ef66f95701a 60f09a81c5f8c88ea97af75116c7de2d333f8354 b86a8f45d6a85f7b1f254092b457071638bbcc89 5f3e1424a9f5afd2c66109dad19419710c15c23e c407b7275a3949a1a87a22a1afc80690031b6f92 602df759e80a3c51342cbe1d25a57fb51ba6e8be 68046c6c18d20e656a6dedf1bd875ef8b47eb2bb 7663d2640c7b54cdc8cf36d575f1458cb79e22e9 0b9dbc14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:84:39:20:6b:73:1f:c7:d6:d4:1c:4d:86:74:c6:c2:3a:2a:14:e4] modulus: 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 public exponent: 10001 ] 2022-09-22 03:53:21.428  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-22 03:53:21.431 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-22 03:53:21.434 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-22 03:53:21.435 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-22 03:53:21.436  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-22 03:53:21.437  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-22 03:53:21.438  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-22 03:53:21.439 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-22 03:53:21.439 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-22 03:53:21.440 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-22 03:53:21.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-22 03:53:21.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:53:21.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:53:21.449 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:53:21.637  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-22 03:53:21.639  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-22 03:53:21.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-22 03:53:21.640 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:53:21.642  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-22 03:53:21.643  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-22 03:53:21.643 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:53:21.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:53:21.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:53:21.645 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:53:21.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:53:21.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:53:21.647 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:53:21.648 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:53:21.648 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:53:21.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-22 03:53:21.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120637864996508845249366366539834954528627475852 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 22 02:36:36 UTC 2022 Final Date: Tue Sep 21 02:36:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:b3:f1:65:2c:06:04:83:de:1b:cd:a8:c9:6f:8a:4b:7f:1a:2e:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b56fc519cbb9e04cb9816130af9ed153a113a43 12020de4c6c99ede871911c95a932dc6d8067282 74ef37bccf754e5f1172262e9096fd512de113d9 e94538cafc9984594adff342ba8c99f51f007d2d 2f8c7e8667dbc1a2d5ac8efee0f167ef7d4ee260 f91544ed73065c686ac4082f3953c09d1275c6bf 426037a79c8418bf3268d803fe453e28da60e0c0 51e9238a4df89141dcd05b4bce38c865350d43f8 b40d1a41d4bffa369ec1bf3f4cd4497959e200ee b8b054be01f8544b9429b6f03ac079eb35351b9a 0ce3d87dec175ea307d071d82aa64574264206c3 13641dfe3e540c05baf15212d79d1ef66f95701a 60f09a81c5f8c88ea97af75116c7de2d333f8354 b86a8f45d6a85f7b1f254092b457071638bbcc89 5f3e1424a9f5afd2c66109dad19419710c15c23e c407b7275a3949a1a87a22a1afc80690031b6f92 602df759e80a3c51342cbe1d25a57fb51ba6e8be 68046c6c18d20e656a6dedf1bd875ef8b47eb2bb 7663d2640c7b54cdc8cf36d575f1458cb79e22e9 0b9dbc14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:4b:7d:65:04:55:99:89:05:3b:4f:58:90:53:77:b9:b6:7f:3d:96] modulus: 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 public exponent: 10001 ] 2022-09-22 03:58:06.300  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-22 03:58:06.303 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-22 03:58:06.313 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-22 03:58:06.314 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-22 03:58:06.314  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-22 03:58:06.315  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-22 03:58:06.316  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-22 03:58:06.316 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-22 03:58:06.317 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-22 03:58:06.317 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-22 03:58:06.322 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-22 03:58:06.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:58:06.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:58:06.324 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:58:06.562  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-22 03:58:06.563  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-22 03:58:06.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-22 03:58:06.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:58:06.566  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-22 03:58:06.567  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-22 03:58:06.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:58:06.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:58:06.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:58:06.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:58:06.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:58:06.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:58:06.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:58:06.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:58:06.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:58:06.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-22 03:58:06.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120637864996508845249366366539834954528627475852 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 22 02:36:36 UTC 2022 Final Date: Tue Sep 21 02:36:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:b3:f1:65:2c:06:04:83:de:1b:cd:a8:c9:6f:8a:4b:7f:1a:2e:f5] modulus: d06d66ab8b7d34276d91b435a977e36603fb033084f766f0873f6a0625c30619a0e8f25d42b1350a649a5b24882140e19e72adf843e6c3eb3255bcef51a37fc331ebf9160e1d63e5f09171fb446e2243689c31c1ba12704d533efcdcf5dea5284e354ef9c42ac6163ae9acf646cf4314038076ddc73177d8e06dc082b9344249b6265f8e0c66e38edcce075e8897be92751bfc37bde55f717f1006fc8cc038c0f09a4d39707d8f2fa90b9aaf30e0c9ffd74e81f456164dda0e0417ae1e2f22f205aa54a2163455d7028c3ccac3ab15e9d23624ae7c74bbf8a0bb2bf9bbbd587380005cdf59127942441d193959bce2c5ad090a81915e41514e9b0db0cf6a0bce174d1478fdfd99f3a4dc3cfc8cf2b01fb1a5a2665fb64c52fe54e8a5a28fe4bbee98e48bb3f82ae2c4220b8c83c0f67e33a6bffe8b47a9a67b76db3367f5a32e64bde2a55336d1849dbeabce92a51e52d5fe5a90430f83c2574c5c6475ef9feafe9196d5a3d39016b9e7960d650a92b96675f32e68a73cccb42834ece3040bd1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b56fc519cbb9e04cb9816130af9ed153a113a43 12020de4c6c99ede871911c95a932dc6d8067282 74ef37bccf754e5f1172262e9096fd512de113d9 e94538cafc9984594adff342ba8c99f51f007d2d 2f8c7e8667dbc1a2d5ac8efee0f167ef7d4ee260 f91544ed73065c686ac4082f3953c09d1275c6bf 426037a79c8418bf3268d803fe453e28da60e0c0 51e9238a4df89141dcd05b4bce38c865350d43f8 b40d1a41d4bffa369ec1bf3f4cd4497959e200ee b8b054be01f8544b9429b6f03ac079eb35351b9a 0ce3d87dec175ea307d071d82aa64574264206c3 13641dfe3e540c05baf15212d79d1ef66f95701a 60f09a81c5f8c88ea97af75116c7de2d333f8354 b86a8f45d6a85f7b1f254092b457071638bbcc89 5f3e1424a9f5afd2c66109dad19419710c15c23e c407b7275a3949a1a87a22a1afc80690031b6f92 602df759e80a3c51342cbe1d25a57fb51ba6e8be 68046c6c18d20e656a6dedf1bd875ef8b47eb2bb 7663d2640c7b54cdc8cf36d575f1458cb79e22e9 0b9dbc14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c6:91:e2:53:d1:71:88:4f:24:73:17:c0:d9:ea:c7:1a:66:0f:0c:27] modulus: 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 public exponent: 10001 ] 2022-09-22 03:58:20.896  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-22 03:58:20.897 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-22 03:58:20.901 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-22 03:58:20.901 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-22 03:58:20.902  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-22 03:58:20.903  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-22 03:58:20.903  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-22 03:58:20.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-22 03:58:20.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-22 03:58:20.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-22 03:58:20.909 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-22 03:58:20.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:58:20.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-22 03:58:20.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:58:21.054  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-22 03:58:21.055  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-22 03:58:21.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-22 03:58:21.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-22 03:58:21.057  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-22 03:58:21.057  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-22 03:58:21.057 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:58:21.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:58:21.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:58:21.059 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:58:21.059 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:58:21.059 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:58:21.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-22 03:58:21.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-22 03:58:21.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-22 03:58:21.061 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-22 03:58:21.065 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120637864996508845249366366539834954528627475852 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 22 02:36:36 UTC 2022 Final Date: Tue Sep 21 02:36:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:b3:f1:65:2c:06:04:83:de:1b:cd:a8:c9:6f:8a:4b:7f:1a:2e:f5] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b56fc519cbb9e04cb9816130af9ed153a113a43 12020de4c6c99ede871911c95a932dc6d8067282 74ef37bccf754e5f1172262e9096fd512de113d9 e94538cafc9984594adff342ba8c99f51f007d2d 2f8c7e8667dbc1a2d5ac8efee0f167ef7d4ee260 f91544ed73065c686ac4082f3953c09d1275c6bf 426037a79c8418bf3268d803fe453e28da60e0c0 51e9238a4df89141dcd05b4bce38c865350d43f8 b40d1a41d4bffa369ec1bf3f4cd4497959e200ee b8b054be01f8544b9429b6f03ac079eb35351b9a 0ce3d87dec175ea307d071d82aa64574264206c3 13641dfe3e540c05baf15212d79d1ef66f95701a 60f09a81c5f8c88ea97af75116c7de2d333f8354 b86a8f45d6a85f7b1f254092b457071638bbcc89 5f3e1424a9f5afd2c66109dad19419710c15c23e c407b7275a3949a1a87a22a1afc80690031b6f92 602df759e80a3c51342cbe1d25a57fb51ba6e8be 68046c6c18d20e656a6dedf1bd875ef8b47eb2bb 7663d2640c7b54cdc8cf36d575f1458cb79e22e9 0b9dbc14 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ef:a6:f9:24:20:9a:c6:fa:f7:98:ef:3c:e8:c5:e3:c1:8c:34:51:05] modulus: 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 public exponent: 10001 ]