2022-09-30 03:02:54,257 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-09-30 03:02:55,064 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-09-30 03:02:55.886  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Sep 30, 2022 3:02:57 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Sep 30, 2022 3:02:57 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Sep 30, 2022 3:02:57 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Sep 30, 2022 3:02:57 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-09-30 03:02:58.471 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-09-30 03:02:58.763  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-09-30 03:02:58.932  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-09-30 03:02:59.654 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-09-30 03:02:59.657 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-09-30 03:02:59.659 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-09-30 03:02:59.662 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-09-30 03:02:59.701 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-09-30 03:02:59.704 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-09-30 03:02:59.844 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-09-30 03:03:00.481 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Sep 30, 2022 3:03:01 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-09-30 03:03:01.354  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.861 seconds (JVM running for 9.552) Sep 30, 2022 3:03:27 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-09-30 03:04:30.472  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 03:04:30.482 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 03:04:30.524 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-30 03:04:30.529 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 03:04:30.548  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-30 03:04:30.551  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 03:04:30.552  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 03:04:30.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 03:04:30.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 03:04:30.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 03:04:30.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 03:04:30.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 03:04:30.608 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 03:04:30.617 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 03:04:30.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 03:04:30.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 03:04:31.276  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 03:04:31.279  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 03:04:31.280 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 03:04:31.281 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 03:04:31.292  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 03:04:31.293  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 03:04:31.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 03:04:31.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 03:04:31.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 03:04:31.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 03:04:31.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 03:04:31.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 03:04:31.315 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 03:04:31.316 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 03:04:31.316 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 03:04:31.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 03:04:31.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 280090428864408987871629136726551207273479488772 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 03:00:45 UTC 2022 Final Date: Wed Sep 29 03:00:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:d8:ef:e4:c9:cc:85:c2:4c:18:b9:7c:bf:dd:af:59:cd:63:ed:0d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 191e03c9d6926491a0d677b0f93aa601a951cf48 7518bfd0f40796b04b54158df01a49ecae6dcabc 26c3ca3436865bafe208b64105c4549c36dc8d02 cd98026ac8d89053e497fe7a73d20cca831b8ccd 7b25f2e7233efd09e31620ddd5ce4b1dc621e439 b7ce10dc4adce345234cb417eb083a7136005821 73b0a267375348d407f0f4f9f36c224c63ff1e7d 92f32c887037f474be62c969198632b8c5a111c2 d9cf472dca1808be1c220cab61b6e4f7ad7bc415 c60e918e9608aa09d9fd95c6e784ea7a45d674a5 0267d326bebd2f50f70283d77cc333c2e530ab97 db2ce12452da818e77d36f1ec9892326ef483ff8 3e25c139775f637b73eb4d553b529c65ed861f26 ce5f61a8a8199418dd5c17ff2928e5356282bff7 ff9cd6edc5ed08179ffba3cd788654ecf75b1982 e93262c7164aac05d5acd83ecf3cd595be6d6f50 a125d5403e343f0626c261c0b88ddcfd2df75189 7b5ee8aedfbc380f8f527456684c49a34d9e2cd8 10c2861cf92562b1038f99d89c2b3903a8dcaeb1 ccf18fee Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:62:ed:83:30:a6:dc:1d:e1:00:d9:6d:42:ad:04:d6:00:04:02:f9] modulus: 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 public exponent: 10001 ] 2022-09-30 04:26:16.060  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 04:26:16.064 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 04:26:16.067 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 04:26:16.068 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 04:26:16.069  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 04:26:16.070  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 04:26:16.070  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 04:26:16.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 04:26:16.072 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 04:26:16.072 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 04:26:16.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 04:26:16.085 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:26:16.086 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:26:16.086 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:26:16.288  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 04:26:16.290  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 04:26:16.291 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 04:26:16.292 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:26:16.296  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 04:26:16.297  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 04:26:16.298 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:26:16.299 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:26:16.299 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:26:16.302 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:26:16.302 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:26:16.303 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:26:16.305 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:26:16.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:26:16.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:26:16.308 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 04:26:16.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 280090428864408987871629136726551207273479488772 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 03:00:45 UTC 2022 Final Date: Wed Sep 29 03:00:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:d8:ef:e4:c9:cc:85:c2:4c:18:b9:7c:bf:dd:af:59:cd:63:ed:0d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 191e03c9d6926491a0d677b0f93aa601a951cf48 7518bfd0f40796b04b54158df01a49ecae6dcabc 26c3ca3436865bafe208b64105c4549c36dc8d02 cd98026ac8d89053e497fe7a73d20cca831b8ccd 7b25f2e7233efd09e31620ddd5ce4b1dc621e439 b7ce10dc4adce345234cb417eb083a7136005821 73b0a267375348d407f0f4f9f36c224c63ff1e7d 92f32c887037f474be62c969198632b8c5a111c2 d9cf472dca1808be1c220cab61b6e4f7ad7bc415 c60e918e9608aa09d9fd95c6e784ea7a45d674a5 0267d326bebd2f50f70283d77cc333c2e530ab97 db2ce12452da818e77d36f1ec9892326ef483ff8 3e25c139775f637b73eb4d553b529c65ed861f26 ce5f61a8a8199418dd5c17ff2928e5356282bff7 ff9cd6edc5ed08179ffba3cd788654ecf75b1982 e93262c7164aac05d5acd83ecf3cd595be6d6f50 a125d5403e343f0626c261c0b88ddcfd2df75189 7b5ee8aedfbc380f8f527456684c49a34d9e2cd8 10c2861cf92562b1038f99d89c2b3903a8dcaeb1 ccf18fee Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:ce:9d:cc:38:7e:b7:25:41:c8:50:a7:5f:d1:01:a3:cc:89:38:61] modulus: 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 public exponent: 10001 ] 2022-09-30 04:28:04.432  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 04:28:04.433 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 04:28:04.435 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-30 04:28:04.436 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 04:28:04.436  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-30 04:28:04.437  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 04:28:04.438  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 04:28:04.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 04:28:04.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 04:28:04.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 04:28:04.450 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 04:28:04.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:28:04.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:28:04.452 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:28:04.631  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 04:28:04.632  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 04:28:04.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 04:28:04.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:28:04.636  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 04:28:04.637  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 04:28:04.637 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:28:04.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:28:04.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:28:04.639 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:28:04.640 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:28:04.640 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:28:04.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:28:04.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:28:04.642 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:28:04.643 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 04:28:04.648 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 280090428864408987871629136726551207273479488772 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 03:00:45 UTC 2022 Final Date: Wed Sep 29 03:00:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:d8:ef:e4:c9:cc:85:c2:4c:18:b9:7c:bf:dd:af:59:cd:63:ed:0d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 191e03c9d6926491a0d677b0f93aa601a951cf48 7518bfd0f40796b04b54158df01a49ecae6dcabc 26c3ca3436865bafe208b64105c4549c36dc8d02 cd98026ac8d89053e497fe7a73d20cca831b8ccd 7b25f2e7233efd09e31620ddd5ce4b1dc621e439 b7ce10dc4adce345234cb417eb083a7136005821 73b0a267375348d407f0f4f9f36c224c63ff1e7d 92f32c887037f474be62c969198632b8c5a111c2 d9cf472dca1808be1c220cab61b6e4f7ad7bc415 c60e918e9608aa09d9fd95c6e784ea7a45d674a5 0267d326bebd2f50f70283d77cc333c2e530ab97 db2ce12452da818e77d36f1ec9892326ef483ff8 3e25c139775f637b73eb4d553b529c65ed861f26 ce5f61a8a8199418dd5c17ff2928e5356282bff7 ff9cd6edc5ed08179ffba3cd788654ecf75b1982 e93262c7164aac05d5acd83ecf3cd595be6d6f50 a125d5403e343f0626c261c0b88ddcfd2df75189 7b5ee8aedfbc380f8f527456684c49a34d9e2cd8 10c2861cf92562b1038f99d89c2b3903a8dcaeb1 ccf18fee Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:a0:f6:92:88:da:03:11:80:8e:cd:d8:b9:e5:3f:28:08:c4:6c:32] modulus: c45239759b3d536bcc28a97d5dfefb17d5b56f3b090991c2b94c5b94a164021fa899876addbef827354da8b3d236b31a398b65ac60ba3e3f0587ccf6accf701f07537bfc5719d68d17736be7e4e00f2140a712885d7ee1843981f85ac50bc532322c155b9c7e99cae92196f7c0ba686688a53e9847a252cf1ce16f6a56f2069123c0b0e5d562f0e913b1b0e5597039e005bce0f79ec7d1a212317c1b7dca3ae1e78e2d630c425316faf315ea7eb8fb7da2f96e9bb588032a7c074486ea86e4eb717ca0ae2b6552fb413155dd1319a18eb808c26f9365f3afa202fe7927366afc83db283942780f0447ea1b44c62dcaac1155425926cb6dd278c9c6499fe3b1a3 public exponent: 10001 ] 2022-09-30 04:29:17.594  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 04:29:17.595 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 04:29:17.597 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-30 04:29:17.598 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 04:29:17.598  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-30 04:29:17.599  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 04:29:17.599  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 04:29:17.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 04:29:17.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 04:29:17.601 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 04:29:17.605 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 04:29:17.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:29:17.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:29:17.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:29:17.771  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 04:29:17.772  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 04:29:17.772 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 04:29:17.772 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:29:17.774  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 04:29:17.775  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 04:29:17.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:29:17.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:29:17.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:29:17.777 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:29:17.778 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:29:17.778 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:29:17.779 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:29:17.779 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:29:17.780 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:29:17.781 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 04:29:17.785 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 280090428864408987871629136726551207273479488772 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 03:00:45 UTC 2022 Final Date: Wed Sep 29 03:00:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:d8:ef:e4:c9:cc:85:c2:4c:18:b9:7c:bf:dd:af:59:cd:63:ed:0d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 191e03c9d6926491a0d677b0f93aa601a951cf48 7518bfd0f40796b04b54158df01a49ecae6dcabc 26c3ca3436865bafe208b64105c4549c36dc8d02 cd98026ac8d89053e497fe7a73d20cca831b8ccd 7b25f2e7233efd09e31620ddd5ce4b1dc621e439 b7ce10dc4adce345234cb417eb083a7136005821 73b0a267375348d407f0f4f9f36c224c63ff1e7d 92f32c887037f474be62c969198632b8c5a111c2 d9cf472dca1808be1c220cab61b6e4f7ad7bc415 c60e918e9608aa09d9fd95c6e784ea7a45d674a5 0267d326bebd2f50f70283d77cc333c2e530ab97 db2ce12452da818e77d36f1ec9892326ef483ff8 3e25c139775f637b73eb4d553b529c65ed861f26 ce5f61a8a8199418dd5c17ff2928e5356282bff7 ff9cd6edc5ed08179ffba3cd788654ecf75b1982 e93262c7164aac05d5acd83ecf3cd595be6d6f50 a125d5403e343f0626c261c0b88ddcfd2df75189 7b5ee8aedfbc380f8f527456684c49a34d9e2cd8 10c2861cf92562b1038f99d89c2b3903a8dcaeb1 ccf18fee Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:11:f8:34:91:6c:73:3a:0c:97:71:6d:e8:52:09:96:d0:63:c1:43] modulus: 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 public exponent: 10001 ] 2022-09-30 04:31:19.094  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 04:31:19.096 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 04:31:19.098 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 04:31:19.099 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 04:31:19.100  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-30 04:31:19.101  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 04:31:19.101  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 04:31:19.102 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 04:31:19.102 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 04:31:19.103 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 04:31:19.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 04:31:19.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:31:19.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:31:19.110 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:31:19.246  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 04:31:19.247  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 04:31:19.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 04:31:19.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:31:19.249  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 04:31:19.249  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 04:31:19.250 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:31:19.251 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:31:19.251 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:31:19.252 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:31:19.252 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:31:19.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:31:19.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:31:19.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:31:19.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:31:19.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 04:31:19.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 280090428864408987871629136726551207273479488772 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 03:00:45 UTC 2022 Final Date: Wed Sep 29 03:00:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:d8:ef:e4:c9:cc:85:c2:4c:18:b9:7c:bf:dd:af:59:cd:63:ed:0d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 191e03c9d6926491a0d677b0f93aa601a951cf48 7518bfd0f40796b04b54158df01a49ecae6dcabc 26c3ca3436865bafe208b64105c4549c36dc8d02 cd98026ac8d89053e497fe7a73d20cca831b8ccd 7b25f2e7233efd09e31620ddd5ce4b1dc621e439 b7ce10dc4adce345234cb417eb083a7136005821 73b0a267375348d407f0f4f9f36c224c63ff1e7d 92f32c887037f474be62c969198632b8c5a111c2 d9cf472dca1808be1c220cab61b6e4f7ad7bc415 c60e918e9608aa09d9fd95c6e784ea7a45d674a5 0267d326bebd2f50f70283d77cc333c2e530ab97 db2ce12452da818e77d36f1ec9892326ef483ff8 3e25c139775f637b73eb4d553b529c65ed861f26 ce5f61a8a8199418dd5c17ff2928e5356282bff7 ff9cd6edc5ed08179ffba3cd788654ecf75b1982 e93262c7164aac05d5acd83ecf3cd595be6d6f50 a125d5403e343f0626c261c0b88ddcfd2df75189 7b5ee8aedfbc380f8f527456684c49a34d9e2cd8 10c2861cf92562b1038f99d89c2b3903a8dcaeb1 ccf18fee Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f8:a6:9c:f5:db:9e:23:53:24:79:9e:e0:59:f3:7d:1b:74:49:da:64] modulus: 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 public exponent: 10001 ] 2022-09-30 04:43:59.541  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 04:43:59.545 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 04:43:59.548 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-30 04:43:59.549 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 04:43:59.550  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-30 04:43:59.551  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 04:43:59.551  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 04:43:59.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 04:43:59.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 04:43:59.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 04:43:59.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 04:43:59.562 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:43:59.562 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:43:59.562 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:43:59.718  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 04:43:59.719  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 04:43:59.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 04:43:59.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:43:59.721  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 04:43:59.722  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 04:43:59.722 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:43:59.723 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:43:59.723 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:43:59.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:43:59.725 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:43:59.725 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:43:59.726 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:43:59.726 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:43:59.726 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:43:59.728 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 04:43:59.732 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 280090428864408987871629136726551207273479488772 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 03:00:45 UTC 2022 Final Date: Wed Sep 29 03:00:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:d8:ef:e4:c9:cc:85:c2:4c:18:b9:7c:bf:dd:af:59:cd:63:ed:0d] modulus: 9f6710525a9473ea066757298fd2e430607245c6aadb2dffdba1d4f71468d31831baf55edd1e0159e1e02daa579ac66368339e18135e83bf1ab8b526cbe5bb755cad394782155d4bf4c88a3e84ecf986cf43df68d4b0ef359a7c53c03cc754bde1f2c3c506da56229204fd75faf879398aaf9b2dbbe22ea52530b50adbb21749e9698aca3c7208e7627db5ecdd9439ba5b7ca68e45df92460885580025a62a61dcd0af720d5d6f4274eec31b77bf5aa80bfd748c31b3ede38bf848ee554651f8f6c042695bfc5679381551f871f075bdbbc1c1656285aa3e5e2f7f1ee0b865b1bd3c9603e67985c71b4853591e01fca4bfff7a60e7369ece12eb0e3742911644f94485ff7f246eba1e95a3d58838b91a4c2b655173f2698fdcee2ddbda2dae0c1fb85e38418bc741130600c10e389dddbaf0fc2e1dbc1d8be4f6ac040b921a418649b18c6f5fd6f929f49c78c42009e12e56a226d75f493d455bcd13fd5cbb6d5f4bf1f44d950e11c9e0948be38799c0cd6154ab04cc14fd6081cc70016bfc07 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 191e03c9d6926491a0d677b0f93aa601a951cf48 7518bfd0f40796b04b54158df01a49ecae6dcabc 26c3ca3436865bafe208b64105c4549c36dc8d02 cd98026ac8d89053e497fe7a73d20cca831b8ccd 7b25f2e7233efd09e31620ddd5ce4b1dc621e439 b7ce10dc4adce345234cb417eb083a7136005821 73b0a267375348d407f0f4f9f36c224c63ff1e7d 92f32c887037f474be62c969198632b8c5a111c2 d9cf472dca1808be1c220cab61b6e4f7ad7bc415 c60e918e9608aa09d9fd95c6e784ea7a45d674a5 0267d326bebd2f50f70283d77cc333c2e530ab97 db2ce12452da818e77d36f1ec9892326ef483ff8 3e25c139775f637b73eb4d553b529c65ed861f26 ce5f61a8a8199418dd5c17ff2928e5356282bff7 ff9cd6edc5ed08179ffba3cd788654ecf75b1982 e93262c7164aac05d5acd83ecf3cd595be6d6f50 a125d5403e343f0626c261c0b88ddcfd2df75189 7b5ee8aedfbc380f8f527456684c49a34d9e2cd8 10c2861cf92562b1038f99d89c2b3903a8dcaeb1 ccf18fee Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cd:c9:f5:09:fb:9e:36:07:dd:46:c1:3a:24:66:2b:ca:19:1b:ca:78] modulus: f95503d998c2f18bc22535c3624000c3420e5fe75d9bc20e1fe196b539c284f7e0cd61172e82fcfd785e55f33513cfd1e7cb46bc9011ccb7421c0952811f76d21e4431b60a58ee02eee754baae11a586bbff17502ecf1b0c4ee8bdd205fa5b0222f247e18145e0dc748684d05409b34e9ea5a990d821f1f14e83103a18b8162b5b9ef8405c19fa37663f06dc7f093f571d0e17a5f2344a366fcbd9d9e2d5925d3d2585bcfb6b8bbc3ecc59f06848c07b2661f0a312fb10e593c0cb7f3bf6281c4d3c8d65089844a119c5130edf26e46a3736652262843b3290baa732f21b0cac4bde62b23a95a4bd8b3e49fde887bd64bb77ec9f2a1e4ad94a053f6b01f90fa3 public exponent: 10001 ] 2022-09-30 04:48:28.776  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 04:48:28.778 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 04:48:28.780 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-30 04:48:28.781 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 04:48:28.781  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-30 04:48:28.782  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 04:48:28.783  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 04:48:28.783 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 04:48:28.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 04:48:28.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 04:48:28.791 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 04:48:28.792 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:48:28.792 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:48:28.793 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:48:28.975  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 04:48:28.976  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 04:48:28.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 04:48:28.977 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:48:28.978  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 04:48:28.979  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 04:48:28.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:48:28.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:48:28.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:48:28.981 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:48:28.981 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:48:28.982 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:48:28.983 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:48:28.983 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:48:28.983 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:48:28.984 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 04:48:28.988 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 280090428864408987871629136726551207273479488772 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 03:00:45 UTC 2022 Final Date: Wed Sep 29 03:00:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:d8:ef:e4:c9:cc:85:c2:4c:18:b9:7c:bf:dd:af:59:cd:63:ed:0d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 191e03c9d6926491a0d677b0f93aa601a951cf48 7518bfd0f40796b04b54158df01a49ecae6dcabc 26c3ca3436865bafe208b64105c4549c36dc8d02 cd98026ac8d89053e497fe7a73d20cca831b8ccd 7b25f2e7233efd09e31620ddd5ce4b1dc621e439 b7ce10dc4adce345234cb417eb083a7136005821 73b0a267375348d407f0f4f9f36c224c63ff1e7d 92f32c887037f474be62c969198632b8c5a111c2 d9cf472dca1808be1c220cab61b6e4f7ad7bc415 c60e918e9608aa09d9fd95c6e784ea7a45d674a5 0267d326bebd2f50f70283d77cc333c2e530ab97 db2ce12452da818e77d36f1ec9892326ef483ff8 3e25c139775f637b73eb4d553b529c65ed861f26 ce5f61a8a8199418dd5c17ff2928e5356282bff7 ff9cd6edc5ed08179ffba3cd788654ecf75b1982 e93262c7164aac05d5acd83ecf3cd595be6d6f50 a125d5403e343f0626c261c0b88ddcfd2df75189 7b5ee8aedfbc380f8f527456684c49a34d9e2cd8 10c2861cf92562b1038f99d89c2b3903a8dcaeb1 ccf18fee Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:5f:09:b9:71:d0:4f:ac:c0:c0:f4:d3:0d:03:5e:28:59:2b:06:0f] modulus: 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 public exponent: 10001 ] 2022-09-30 04:48:45.509  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-30 04:48:45.510 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-30 04:48:45.511 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-30 04:48:45.512 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-30 04:48:45.512  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-30 04:48:45.513  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-30 04:48:45.513  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-30 04:48:45.514 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-30 04:48:45.514 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-30 04:48:45.515 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-30 04:48:45.519 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-30 04:48:45.520 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:48:45.520 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-30 04:48:45.521 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:48:45.637  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-30 04:48:45.638  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-30 04:48:45.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-30 04:48:45.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-30 04:48:45.640  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-30 04:48:45.640  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-30 04:48:45.641 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:48:45.641 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:48:45.642 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:48:45.642 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:48:45.643 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:48:45.643 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:48:45.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-30 04:48:45.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-30 04:48:45.645 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-30 04:48:45.646 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-30 04:48:45.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 280090428864408987871629136726551207273479488772 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 30 03:00:45 UTC 2022 Final Date: Wed Sep 29 03:00:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:d8:ef:e4:c9:cc:85:c2:4c:18:b9:7c:bf:dd:af:59:cd:63:ed:0d] modulus: 9f6710525a9473ea066757298fd2e430607245c6aadb2dffdba1d4f71468d31831baf55edd1e0159e1e02daa579ac66368339e18135e83bf1ab8b526cbe5bb755cad394782155d4bf4c88a3e84ecf986cf43df68d4b0ef359a7c53c03cc754bde1f2c3c506da56229204fd75faf879398aaf9b2dbbe22ea52530b50adbb21749e9698aca3c7208e7627db5ecdd9439ba5b7ca68e45df92460885580025a62a61dcd0af720d5d6f4274eec31b77bf5aa80bfd748c31b3ede38bf848ee554651f8f6c042695bfc5679381551f871f075bdbbc1c1656285aa3e5e2f7f1ee0b865b1bd3c9603e67985c71b4853591e01fca4bfff7a60e7369ece12eb0e3742911644f94485ff7f246eba1e95a3d58838b91a4c2b655173f2698fdcee2ddbda2dae0c1fb85e38418bc741130600c10e389dddbaf0fc2e1dbc1d8be4f6ac040b921a418649b18c6f5fd6f929f49c78c42009e12e56a226d75f493d455bcd13fd5cbb6d5f4bf1f44d950e11c9e0948be38799c0cd6154ab04cc14fd6081cc70016bfc07 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 191e03c9d6926491a0d677b0f93aa601a951cf48 7518bfd0f40796b04b54158df01a49ecae6dcabc 26c3ca3436865bafe208b64105c4549c36dc8d02 cd98026ac8d89053e497fe7a73d20cca831b8ccd 7b25f2e7233efd09e31620ddd5ce4b1dc621e439 b7ce10dc4adce345234cb417eb083a7136005821 73b0a267375348d407f0f4f9f36c224c63ff1e7d 92f32c887037f474be62c969198632b8c5a111c2 d9cf472dca1808be1c220cab61b6e4f7ad7bc415 c60e918e9608aa09d9fd95c6e784ea7a45d674a5 0267d326bebd2f50f70283d77cc333c2e530ab97 db2ce12452da818e77d36f1ec9892326ef483ff8 3e25c139775f637b73eb4d553b529c65ed861f26 ce5f61a8a8199418dd5c17ff2928e5356282bff7 ff9cd6edc5ed08179ffba3cd788654ecf75b1982 e93262c7164aac05d5acd83ecf3cd595be6d6f50 a125d5403e343f0626c261c0b88ddcfd2df75189 7b5ee8aedfbc380f8f527456684c49a34d9e2cd8 10c2861cf92562b1038f99d89c2b3903a8dcaeb1 ccf18fee Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:9a:81:bd:89:37:90:1e:b4:7d:13:f7:df:71:36:6f:d2:b0:9c:e7] modulus: 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 public exponent: 10001 ]