2022-11-03 02:50:04,602 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-03 02:50:05,466 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-03 02:50:06.184  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Nov 03, 2022 2:50:08 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 03, 2022 2:50:08 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 03, 2022 2:50:08 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 03, 2022 2:50:08 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-03 02:50:08.559 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-03 02:50:08.857  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-11-03 02:50:09.022  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-03 02:50:09.689 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-03 02:50:09.692 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-03 02:50:09.693 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-03 02:50:09.697 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-03 02:50:09.736 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-03 02:50:09.739 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-11-03 02:50:09.852 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-11-03 02:50:10.500 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 03, 2022 2:50:11 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-03 02:50:11.351  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.469 seconds (JVM running for 9.103) Nov 03, 2022 2:50:35 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-03 02:51:09.138  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-03 02:51:09.152 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-03 02:51:09.246 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-03 02:51:09.250 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 02:51:09.267  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-03 02:51:09.271  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-03 02:51:09.274  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-03 02:51:09.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-03 02:51:09.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 02:51:09.280 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-03 02:51:09.315 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-03 02:51:09.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-03 02:51:09.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-03 02:51:09.424 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 02:51:09.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 02:51:09.429 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 02:51:10.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-03 02:51:10.319  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-03 02:51:10.320 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-03 02:51:10.325 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 02:51:10.343  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-03 02:51:10.345  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-03 02:51:10.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 02:51:10.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 02:51:10.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 02:51:10.363 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 02:51:10.364 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 02:51:10.365 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 02:51:10.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 02:51:10.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 02:51:10.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 02:51:10.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 02:51:10.406 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 62045740912562567832330579163149762588858779730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 02:47:45 UTC 2022 Final Date: Tue Nov 02 02:47:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:70:56:79:ec:55:7e:68:8a:52:52:7a:84:29:bb:e0:b1:c2:26:d4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 738a39b5583c6a2d0ccb8b16ae712faa3a9924b8 ace7f5f48438f3816567a58eb6c7b24227484b1e 8f8e54ec193cc6ef4a5b6dfb29686c5f997d6566 e5fba6a56f2a2943d880da8c449649bd7a9343fa c4d8ddb0e785f6f51d37a8e6cff88057db0c8af2 26099782473becf514a5b5acb6537df578ff145b 5923959e256b8700877267e6e55002bcbe49a407 0063229ad42da0a4066d51d6680dd07a11efca4a dbf81af00f1b80119f15accd4f66264219f1ebd3 49dc632a05d9c6fb8d34551896eae38c6f13661d d38c415179631b8f07d5fa9e51ab06507f064692 9c48997a199e99562536cc9a18c945c7a6f936ed 1d8c12ce8f56ea8f41483a133a95fc5d6abe802c 9bc1b399c2c1c46e5a8bb709c41ca8c7ef5223d9 50880170f97d1b81fa98f675e0e288d79df66cc7 b996bd40de64ebeb29f310f7c25fbd2781817a68 df8ae9ab5249a601faa31016372e3989c7a69ebb c2bf8e8a03e3c7df7d0f2b588007328aadc99e22 37d05882debe21e2d730cb99d890b7f679a7da90 0e2a1e4f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:e9:fc:3e:aa:fc:7b:df:d6:c7:57:b8:21:66:68:26:e7:db:6c:6f] modulus: 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 public exponent: 10001 ] 2022-11-03 04:00:03.044  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-03 04:00:03.047 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-03 04:00:03.050 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-03 04:00:03.051 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 04:00:03.052  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-03 04:00:03.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-03 04:00:03.058  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-03 04:00:03.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-03 04:00:03.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-03 04:00:03.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-03 04:00:03.083 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-03 04:00:03.085 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:00:03.085 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:00:03.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:00:03.328  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-03 04:00:03.329  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-03 04:00:03.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-03 04:00:03.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:00:03.333  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-03 04:00:03.334  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-03 04:00:03.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:00:03.336 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:00:03.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:00:03.342 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:00:03.343 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:00:03.343 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:00:03.346 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:00:03.346 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:00:03.347 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:00:03.348 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 04:00:03.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 62045740912562567832330579163149762588858779730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 02:47:45 UTC 2022 Final Date: Tue Nov 02 02:47:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:70:56:79:ec:55:7e:68:8a:52:52:7a:84:29:bb:e0:b1:c2:26:d4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 738a39b5583c6a2d0ccb8b16ae712faa3a9924b8 ace7f5f48438f3816567a58eb6c7b24227484b1e 8f8e54ec193cc6ef4a5b6dfb29686c5f997d6566 e5fba6a56f2a2943d880da8c449649bd7a9343fa c4d8ddb0e785f6f51d37a8e6cff88057db0c8af2 26099782473becf514a5b5acb6537df578ff145b 5923959e256b8700877267e6e55002bcbe49a407 0063229ad42da0a4066d51d6680dd07a11efca4a dbf81af00f1b80119f15accd4f66264219f1ebd3 49dc632a05d9c6fb8d34551896eae38c6f13661d d38c415179631b8f07d5fa9e51ab06507f064692 9c48997a199e99562536cc9a18c945c7a6f936ed 1d8c12ce8f56ea8f41483a133a95fc5d6abe802c 9bc1b399c2c1c46e5a8bb709c41ca8c7ef5223d9 50880170f97d1b81fa98f675e0e288d79df66cc7 b996bd40de64ebeb29f310f7c25fbd2781817a68 df8ae9ab5249a601faa31016372e3989c7a69ebb c2bf8e8a03e3c7df7d0f2b588007328aadc99e22 37d05882debe21e2d730cb99d890b7f679a7da90 0e2a1e4f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:e0:33:34:65:9f:71:80:79:89:e5:a8:a0:29:26:fb:2c:8c:76:eb] modulus: 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 public exponent: 10001 ] 2022-11-03 04:01:34.867  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-03 04:01:34.871 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-03 04:01:34.874 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-03 04:01:34.875 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 04:01:34.876  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-03 04:01:34.877  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-03 04:01:34.878  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-03 04:01:34.878 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-03 04:01:34.879 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-03 04:01:34.880 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-03 04:01:34.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-03 04:01:34.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:01:34.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:01:34.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:01:35.040  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-03 04:01:35.040  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-03 04:01:35.041 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-03 04:01:35.041 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:01:35.045  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-03 04:01:35.045  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-03 04:01:35.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:01:35.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:01:35.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:01:35.047 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:01:35.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:01:35.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:01:35.051 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:01:35.051 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:01:35.051 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:01:35.053 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 04:01:35.057 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 62045740912562567832330579163149762588858779730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 02:47:45 UTC 2022 Final Date: Tue Nov 02 02:47:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:70:56:79:ec:55:7e:68:8a:52:52:7a:84:29:bb:e0:b1:c2:26:d4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 738a39b5583c6a2d0ccb8b16ae712faa3a9924b8 ace7f5f48438f3816567a58eb6c7b24227484b1e 8f8e54ec193cc6ef4a5b6dfb29686c5f997d6566 e5fba6a56f2a2943d880da8c449649bd7a9343fa c4d8ddb0e785f6f51d37a8e6cff88057db0c8af2 26099782473becf514a5b5acb6537df578ff145b 5923959e256b8700877267e6e55002bcbe49a407 0063229ad42da0a4066d51d6680dd07a11efca4a dbf81af00f1b80119f15accd4f66264219f1ebd3 49dc632a05d9c6fb8d34551896eae38c6f13661d d38c415179631b8f07d5fa9e51ab06507f064692 9c48997a199e99562536cc9a18c945c7a6f936ed 1d8c12ce8f56ea8f41483a133a95fc5d6abe802c 9bc1b399c2c1c46e5a8bb709c41ca8c7ef5223d9 50880170f97d1b81fa98f675e0e288d79df66cc7 b996bd40de64ebeb29f310f7c25fbd2781817a68 df8ae9ab5249a601faa31016372e3989c7a69ebb c2bf8e8a03e3c7df7d0f2b588007328aadc99e22 37d05882debe21e2d730cb99d890b7f679a7da90 0e2a1e4f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:dd:25:e0:d4:b1:50:90:87:09:fb:ca:e3:5e:cb:49:97:52:b0:04] modulus: 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 public exponent: 10001 ] 2022-11-03 04:02:34.989  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-03 04:02:34.990 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-03 04:02:34.991 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-03 04:02:34.992 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 04:02:34.992  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-03 04:02:34.993  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-03 04:02:34.993  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-03 04:02:34.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-03 04:02:34.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-03 04:02:34.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-03 04:02:34.999 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-03 04:02:35.000 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:02:35.000 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:02:35.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:02:35.120  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-03 04:02:35.121  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-03 04:02:35.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-03 04:02:35.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:02:35.124  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-03 04:02:35.124  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-03 04:02:35.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:02:35.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:02:35.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:02:35.126 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:02:35.126 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:02:35.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:02:35.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:02:35.128 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:02:35.128 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:02:35.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 04:02:35.134 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 62045740912562567832330579163149762588858779730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 02:47:45 UTC 2022 Final Date: Tue Nov 02 02:47:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:70:56:79:ec:55:7e:68:8a:52:52:7a:84:29:bb:e0:b1:c2:26:d4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 738a39b5583c6a2d0ccb8b16ae712faa3a9924b8 ace7f5f48438f3816567a58eb6c7b24227484b1e 8f8e54ec193cc6ef4a5b6dfb29686c5f997d6566 e5fba6a56f2a2943d880da8c449649bd7a9343fa c4d8ddb0e785f6f51d37a8e6cff88057db0c8af2 26099782473becf514a5b5acb6537df578ff145b 5923959e256b8700877267e6e55002bcbe49a407 0063229ad42da0a4066d51d6680dd07a11efca4a dbf81af00f1b80119f15accd4f66264219f1ebd3 49dc632a05d9c6fb8d34551896eae38c6f13661d d38c415179631b8f07d5fa9e51ab06507f064692 9c48997a199e99562536cc9a18c945c7a6f936ed 1d8c12ce8f56ea8f41483a133a95fc5d6abe802c 9bc1b399c2c1c46e5a8bb709c41ca8c7ef5223d9 50880170f97d1b81fa98f675e0e288d79df66cc7 b996bd40de64ebeb29f310f7c25fbd2781817a68 df8ae9ab5249a601faa31016372e3989c7a69ebb c2bf8e8a03e3c7df7d0f2b588007328aadc99e22 37d05882debe21e2d730cb99d890b7f679a7da90 0e2a1e4f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c4:1b:6f:30:a1:91:61:26:cf:db:38:29:29:43:32:01:7e:cf:eb:44] modulus: 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 public exponent: 10001 ] 2022-11-03 04:04:37.322  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-03 04:04:37.323 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-03 04:04:37.325 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-03 04:04:37.326 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 04:04:37.326  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-03 04:04:37.327  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-03 04:04:37.327  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-03 04:04:37.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-03 04:04:37.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-03 04:04:37.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-03 04:04:37.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-03 04:04:37.340 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:04:37.340 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:04:37.341 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:04:37.476  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-03 04:04:37.477  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-03 04:04:37.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-03 04:04:37.478 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:04:37.479  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-03 04:04:37.480  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-03 04:04:37.480 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:04:37.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:04:37.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:04:37.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:04:37.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:04:37.483 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:04:37.484 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:04:37.484 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:04:37.484 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:04:37.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 04:04:37.489 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 62045740912562567832330579163149762588858779730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 02:47:45 UTC 2022 Final Date: Tue Nov 02 02:47:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:70:56:79:ec:55:7e:68:8a:52:52:7a:84:29:bb:e0:b1:c2:26:d4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 738a39b5583c6a2d0ccb8b16ae712faa3a9924b8 ace7f5f48438f3816567a58eb6c7b24227484b1e 8f8e54ec193cc6ef4a5b6dfb29686c5f997d6566 e5fba6a56f2a2943d880da8c449649bd7a9343fa c4d8ddb0e785f6f51d37a8e6cff88057db0c8af2 26099782473becf514a5b5acb6537df578ff145b 5923959e256b8700877267e6e55002bcbe49a407 0063229ad42da0a4066d51d6680dd07a11efca4a dbf81af00f1b80119f15accd4f66264219f1ebd3 49dc632a05d9c6fb8d34551896eae38c6f13661d d38c415179631b8f07d5fa9e51ab06507f064692 9c48997a199e99562536cc9a18c945c7a6f936ed 1d8c12ce8f56ea8f41483a133a95fc5d6abe802c 9bc1b399c2c1c46e5a8bb709c41ca8c7ef5223d9 50880170f97d1b81fa98f675e0e288d79df66cc7 b996bd40de64ebeb29f310f7c25fbd2781817a68 df8ae9ab5249a601faa31016372e3989c7a69ebb c2bf8e8a03e3c7df7d0f2b588007328aadc99e22 37d05882debe21e2d730cb99d890b7f679a7da90 0e2a1e4f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:28:c0:2c:a4:32:8d:64:73:95:7f:e5:58:b5:ba:df:98:ec:41:76] modulus: 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 public exponent: 10001 ] 2022-11-03 04:12:27.851  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-03 04:12:27.855 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-03 04:12:27.860 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-03 04:12:27.861 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 04:12:27.864  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-03 04:12:27.865  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-03 04:12:27.865  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-03 04:12:27.866 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-03 04:12:27.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-03 04:12:27.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-03 04:12:27.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-03 04:12:27.879 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:12:27.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:12:27.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:12:28.034  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-03 04:12:28.036  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-03 04:12:28.036 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-03 04:12:28.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:12:28.039  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-03 04:12:28.040  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-03 04:12:28.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:12:28.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:12:28.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:12:28.043 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:12:28.043 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:12:28.044 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:12:28.045 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:12:28.046 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:12:28.046 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:12:28.047 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 04:12:28.053 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 62045740912562567832330579163149762588858779730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 02:47:45 UTC 2022 Final Date: Tue Nov 02 02:47:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:70:56:79:ec:55:7e:68:8a:52:52:7a:84:29:bb:e0:b1:c2:26:d4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 738a39b5583c6a2d0ccb8b16ae712faa3a9924b8 ace7f5f48438f3816567a58eb6c7b24227484b1e 8f8e54ec193cc6ef4a5b6dfb29686c5f997d6566 e5fba6a56f2a2943d880da8c449649bd7a9343fa c4d8ddb0e785f6f51d37a8e6cff88057db0c8af2 26099782473becf514a5b5acb6537df578ff145b 5923959e256b8700877267e6e55002bcbe49a407 0063229ad42da0a4066d51d6680dd07a11efca4a dbf81af00f1b80119f15accd4f66264219f1ebd3 49dc632a05d9c6fb8d34551896eae38c6f13661d d38c415179631b8f07d5fa9e51ab06507f064692 9c48997a199e99562536cc9a18c945c7a6f936ed 1d8c12ce8f56ea8f41483a133a95fc5d6abe802c 9bc1b399c2c1c46e5a8bb709c41ca8c7ef5223d9 50880170f97d1b81fa98f675e0e288d79df66cc7 b996bd40de64ebeb29f310f7c25fbd2781817a68 df8ae9ab5249a601faa31016372e3989c7a69ebb c2bf8e8a03e3c7df7d0f2b588007328aadc99e22 37d05882debe21e2d730cb99d890b7f679a7da90 0e2a1e4f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:38:03:5a:df:53:03:0e:df:d8:bb:1b:f3:35:7b:22:09:6c:ed:0f] modulus: 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 public exponent: 10001 ] 2022-11-03 04:17:12.118  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-03 04:17:12.121 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-03 04:17:12.126 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-03 04:17:12.128 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 04:17:12.129  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-03 04:17:12.134  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-03 04:17:12.134  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-03 04:17:12.135 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-03 04:17:12.135 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-03 04:17:12.136 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-03 04:17:12.141 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-03 04:17:12.142 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:17:12.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:17:12.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:17:12.314  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-03 04:17:12.315  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-03 04:17:12.315 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-03 04:17:12.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:17:12.317  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-03 04:17:12.318  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-03 04:17:12.318 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:17:12.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:17:12.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:17:12.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:17:12.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:17:12.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:17:12.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:17:12.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:17:12.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:17:12.323 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 04:17:12.327 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 62045740912562567832330579163149762588858779730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 02:47:45 UTC 2022 Final Date: Tue Nov 02 02:47:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:70:56:79:ec:55:7e:68:8a:52:52:7a:84:29:bb:e0:b1:c2:26:d4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 738a39b5583c6a2d0ccb8b16ae712faa3a9924b8 ace7f5f48438f3816567a58eb6c7b24227484b1e 8f8e54ec193cc6ef4a5b6dfb29686c5f997d6566 e5fba6a56f2a2943d880da8c449649bd7a9343fa c4d8ddb0e785f6f51d37a8e6cff88057db0c8af2 26099782473becf514a5b5acb6537df578ff145b 5923959e256b8700877267e6e55002bcbe49a407 0063229ad42da0a4066d51d6680dd07a11efca4a dbf81af00f1b80119f15accd4f66264219f1ebd3 49dc632a05d9c6fb8d34551896eae38c6f13661d d38c415179631b8f07d5fa9e51ab06507f064692 9c48997a199e99562536cc9a18c945c7a6f936ed 1d8c12ce8f56ea8f41483a133a95fc5d6abe802c 9bc1b399c2c1c46e5a8bb709c41ca8c7ef5223d9 50880170f97d1b81fa98f675e0e288d79df66cc7 b996bd40de64ebeb29f310f7c25fbd2781817a68 df8ae9ab5249a601faa31016372e3989c7a69ebb c2bf8e8a03e3c7df7d0f2b588007328aadc99e22 37d05882debe21e2d730cb99d890b7f679a7da90 0e2a1e4f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:f0:e4:d9:7a:5d:a2:63:00:15:5a:b8:51:d7:92:df:aa:e6:54:a8] modulus: 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 public exponent: 10001 ] 2022-11-03 04:17:29.530  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-03 04:17:29.531 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-03 04:17:29.533 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-03 04:17:29.538 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 04:17:29.539  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-03 04:17:29.540  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-03 04:17:29.540  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-03 04:17:29.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-03 04:17:29.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-03 04:17:29.544 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-03 04:17:29.555 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-03 04:17:29.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:17:29.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-03 04:17:29.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:17:29.675  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-03 04:17:29.676  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-03 04:17:29.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-03 04:17:29.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:17:29.681  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-03 04:17:29.682  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-03 04:17:29.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:17:29.684 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:17:29.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:17:29.692 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:17:29.693 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:17:29.697 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:17:29.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:17:29.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:17:29.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:17:29.703 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 04:17:29.709 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 62045740912562567832330579163149762588858779730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 02:47:45 UTC 2022 Final Date: Tue Nov 02 02:47:44 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:70:56:79:ec:55:7e:68:8a:52:52:7a:84:29:bb:e0:b1:c2:26:d4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 738a39b5583c6a2d0ccb8b16ae712faa3a9924b8 ace7f5f48438f3816567a58eb6c7b24227484b1e 8f8e54ec193cc6ef4a5b6dfb29686c5f997d6566 e5fba6a56f2a2943d880da8c449649bd7a9343fa c4d8ddb0e785f6f51d37a8e6cff88057db0c8af2 26099782473becf514a5b5acb6537df578ff145b 5923959e256b8700877267e6e55002bcbe49a407 0063229ad42da0a4066d51d6680dd07a11efca4a dbf81af00f1b80119f15accd4f66264219f1ebd3 49dc632a05d9c6fb8d34551896eae38c6f13661d d38c415179631b8f07d5fa9e51ab06507f064692 9c48997a199e99562536cc9a18c945c7a6f936ed 1d8c12ce8f56ea8f41483a133a95fc5d6abe802c 9bc1b399c2c1c46e5a8bb709c41ca8c7ef5223d9 50880170f97d1b81fa98f675e0e288d79df66cc7 b996bd40de64ebeb29f310f7c25fbd2781817a68 df8ae9ab5249a601faa31016372e3989c7a69ebb c2bf8e8a03e3c7df7d0f2b588007328aadc99e22 37d05882debe21e2d730cb99d890b7f679a7da90 0e2a1e4f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:f0:82:da:86:17:b9:77:a2:1e:0c:c5:b4:a5:c5:0b:ae:34:36:10] modulus: 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 public exponent: 10001 ]