2023-01-13 11:48:50,341 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-13 11:48:52,504 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-13 11:48:54.129  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jan 13, 2023 11:48:59 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 13, 2023 11:48:59 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 13, 2023 11:48:59 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 13, 2023 11:48:59 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-13 11:49:00.542 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-13 11:49:01.240  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2023-01-13 11:49:01.624  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-13 11:49:03.523 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-13 11:49:03.547 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-13 11:49:03.551 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-13 11:49:03.561 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-13 11:49:03.658 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2023-01-13 11:49:03.670 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-13 11:49:03.954 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2023-01-13 11:49:05.329 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 13, 2023 11:49:06 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-13 11:49:07.244  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 18.828 seconds (JVM running for 23.763) Jan 13, 2023 11:49:20 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-13 11:49:49.242  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 11:49:49.258 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 11:49:49.332 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-13 11:49:49.338 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 11:49:49.369  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-13 11:49:49.373  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 11:49:49.374  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 11:49:49.376 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 11:49:49.377 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 11:49:49.384 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 11:49:49.398 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 11:49:49.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 11:49:49.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 11:49:49.501 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 11:49:49.502 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 11:49:49.508 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 11:49:50.848  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 11:49:50.854  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 11:49:50.855 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 11:49:50.857 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 11:49:50.877  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 11:49:50.883  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 11:49:50.886 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 11:49:50.886 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 11:49:50.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 11:49:50.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 11:49:50.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 11:49:50.924 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 11:49:50.936 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 11:49:50.937 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 11:49:50.938 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 11:49:50.940 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 11:49:50.998 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:0c:29:ea:47:56:9d:a0:3b:b1:02:61:a3:7f:04:3e:00:80:0b:5e],[56:66:d1:a4] modulus: caaba82a4e84c50e57ea389228788b3fdc8a63b4b1b1c9ee45170134bebd6f8a16713178c4fa3d6c8cabc6cc7dcb7a9d67b0dbc20d1e2336e6cb0910dc7099beec536a88f4ae4f7caeddbca6160c8f05bb271b9870627c20b1a5eacb75e5ef1190584f5f9db85e410f832b8ba71ff0577542bfc180d49a7c6af1e1bc83767e4ad842d17fb859599fe607cf3ec620b223dd25537e10e44ea4d5302672e661521ac81c5926f613508bdd7f85164fca16e818984dea16c72183052f7eb0766e2d7a2d06fe0e86b61e48123538cc4685168db24a06ed606e53815c2b4ca822195f262970aeb481021ef8e72dbb1ea9265f81d49855c8b377772c1cb963f116d9a9e7 public exponent: 10001 ] 2023-01-13 15:10:13.494  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 15:10:13.503 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 15:10:13.513 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:10:13.515 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:10:13.516  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:10:13.517  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 15:10:13.518  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 15:10:13.518 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 15:10:13.519 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 15:10:13.520 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 15:10:13.528 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 15:10:13.530 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:10:13.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:10:13.532 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:10:13.833  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 15:10:13.834  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 15:10:13.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 15:10:13.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:10:13.852  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 15:10:13.853  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 15:10:13.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:10:13.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:10:13.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:10:13.858 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:10:13.858 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:10:13.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:10:13.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:10:13.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:10:13.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:10:13.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:10:13.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: cfc25138d78821d546e47077b98af397ca96671ce92cc7ec581fe4d2d46b9fdadca8dca8579ded953648da9c3de5a364590fdc0a3f50f06853bef0a591d16a129c82098f4eb0a4a1002fb299f076cbddc11e296fa60cbe5e8be66adf4cbe33bb87ea845ed9cc952290452a50d40f40427120879740bbb36f13b11f3a1610c5c2e4d08c15b8c01f9d85c4c189a7e201500c8d68fdd06485602e807d368d3d8dea58cf1cdc2ffe5aee01a69c7df262dfda99f1b44ec5379e8ef58b03d76e20324de4a5ccdfda4ba4361755a6425b59727d6b8d891ff6bb0233292daf0d086fc125a3709e800e12ac52db797968a898f5a963539b17098d9a7e5ad09a18f2aadffdd72970b6e59aaee9ab386330dfcb73ed14e022c835c2bd70c110d6345028145346f9fac4e635fd2689e38828afdf3a516efddc1d24ed3e2e12ebfb1fd377a732a29bbb263f76c389d75f878d8fc94ea89224cb2297c85c7a6b6435bf7c56b1c91d8190c5f2346ebce7d8334014314acb0597af4e863cc849eeb6f47dab71fb43 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1b:2e:ad:a8:42:01:16:8f:00:2f:e2:6a:b3:d5:29:40:77:3f:ce:0c],[56:66:d1:a4] modulus: b083bd12a3bf9657e547d3c38424a1f9ab91c23a32546402986e94d21761f65f3b95de79fb420292ac448d67e32beaa401ff9fd4e328c083302e71282ec6324e8d19edf6a0089709d14849cbbadc41c072b49073e2c049c38cfbb122e1a11d0073d6666097d38e9ae66a1b8a227f641cabdb1c266691611791096e4301fbbfac35de1f87caf97fa4d9abba99ffee910c38465bcc5b902bb5f8f5a70c2af72c58629ea9ab4cce2549bef12d88464da7787d0202b117cfb6588310d2d2fc8eb05b138556f8ff7e31532ba36b1f74a4477a5397601cbb58d1d9f9902251224b1374996d61469d8cc583365152179a9b52e6f544b9b5154628e9a3420500225c1ead public exponent: 10001 ] 2023-01-13 15:17:23.322  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 15:17:23.326 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 15:17:23.330 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:17:23.332 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:17:23.332  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:17:23.333  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 15:17:23.334  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 15:17:23.334 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 15:17:23.335 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 15:17:23.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 15:17:23.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 15:17:23.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:17:23.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:17:23.346 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:17:23.609  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 15:17:23.610  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 15:17:23.611 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 15:17:23.611 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:17:23.615  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 15:17:23.616  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 15:17:23.616 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:17:23.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:17:23.620 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:17:23.622 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:17:23.622 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:17:23.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:17:23.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:17:23.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:17:23.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:17:23.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:17:23.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [89:e5:5c:2d:3f:76:45:08:15:77:27:24:5a:6f:b0:2c:10:17:27:e9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:18:37.226  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 15:18:37.228 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 15:18:37.230 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-13 15:18:37.231 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:18:37.241  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-13 15:18:37.244  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 15:18:37.245  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 15:18:37.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 15:18:37.247 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 15:18:37.248 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 15:18:37.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 15:18:37.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:18:37.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:18:37.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:18:37.470  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 15:18:37.470  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 15:18:37.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 15:18:37.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:18:37.474  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 15:18:37.475  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 15:18:37.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:18:37.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:18:37.476 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:18:37.477 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:18:37.478 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:18:37.479 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:18:37.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:18:37.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:18:37.481 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:18:37.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:18:37.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:5f:2c:10:67:c6:6f:5c:d4:00:2c:20:be:2d:75:59:21:df:62:4b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:21:02.835  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 15:21:02.837 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 15:21:02.839 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-13 15:21:02.839 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:21:02.840  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-13 15:21:02.841  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 15:21:02.841  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 15:21:02.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 15:21:02.843 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 15:21:02.843 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 15:21:02.850 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 15:21:02.851 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:21:02.852 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:21:02.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:21:03.074  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 15:21:03.075  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 15:21:03.076 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 15:21:03.076 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:21:03.078  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 15:21:03.079  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 15:21:03.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:21:03.081 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:21:03.081 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:21:03.083 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:21:03.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:21:03.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:21:03.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:21:03.087 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:21:03.087 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:21:03.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:21:03.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: cfc25138d78821d546e47077b98af397ca96671ce92cc7ec581fe4d2d46b9fdadca8dca8579ded953648da9c3de5a364590fdc0a3f50f06853bef0a591d16a129c82098f4eb0a4a1002fb299f076cbddc11e296fa60cbe5e8be66adf4cbe33bb87ea845ed9cc952290452a50d40f40427120879740bbb36f13b11f3a1610c5c2e4d08c15b8c01f9d85c4c189a7e201500c8d68fdd06485602e807d368d3d8dea58cf1cdc2ffe5aee01a69c7df262dfda99f1b44ec5379e8ef58b03d76e20324de4a5ccdfda4ba4361755a6425b59727d6b8d891ff6bb0233292daf0d086fc125a3709e800e12ac52db797968a898f5a963539b17098d9a7e5ad09a18f2aadffdd72970b6e59aaee9ab386330dfcb73ed14e022c835c2bd70c110d6345028145346f9fac4e635fd2689e38828afdf3a516efddc1d24ed3e2e12ebfb1fd377a732a29bbb263f76c389d75f878d8fc94ea89224cb2297c85c7a6b6435bf7c56b1c91d8190c5f2346ebce7d8334014314acb0597af4e863cc849eeb6f47dab71fb43 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:98:b6:b1:92:ed:98:b0:1f:63:69:aa:c9:b0:8b:1f:26:94:91:a5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:23:53.889  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 15:23:53.890 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 15:23:53.892 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:23:53.894 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:23:53.895  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:23:53.896  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 15:23:53.896  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 15:23:53.897 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 15:23:53.897 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 15:23:53.898 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 15:23:53.905 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 15:23:53.906 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:23:53.907 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:23:53.907 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:23:54.182  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 15:23:54.186  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 15:23:54.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 15:23:54.187 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:23:54.189  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 15:23:54.190  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 15:23:54.191 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:23:54.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:23:54.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:23:54.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:23:54.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:23:54.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:23:54.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:23:54.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:23:54.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:23:54.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:23:54.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:4e:a5:2c:bc:d9:e6:9f:00:aa:10:70:23:c2:72:78:77:0b:b4:27],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:32:04.880  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 15:32:04.893 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 15:32:04.901 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:32:04.904 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:32:04.905  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:32:04.906  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 15:32:04.907  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 15:32:04.908 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 15:32:04.909 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 15:32:04.909 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 15:32:04.925 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 15:32:04.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:32:04.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:32:04.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:32:05.381  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 15:32:05.383  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 15:32:05.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 15:32:05.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:32:05.386  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 15:32:05.386  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 15:32:05.388 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:32:05.389 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:32:05.390 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:32:05.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:32:05.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:32:05.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:32:05.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:32:05.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:32:05.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:32:05.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:32:05.403 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:28:b6:3d:2a:81:3d:0d:bf:68:90:cd:6b:9a:e5:00:2c:60:8a:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 15:39:15.936  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 15:39:15.944 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 15:39:15.957 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:39:15.964 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 15:39:15.965  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 15:39:15.966  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 15:39:15.966  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 15:39:15.967 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 15:39:15.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 15:39:15.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 15:39:15.986 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 15:39:15.988 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:39:15.989 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 15:39:15.989 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:39:16.298  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 15:39:16.299  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 15:39:16.300 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 15:39:16.300 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 15:39:16.303  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 15:39:16.303  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 15:39:16.304 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:39:16.304 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:39:16.305 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:39:16.306 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:39:16.306 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:39:16.306 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:39:16.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 15:39:16.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 15:39:16.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 15:39:16.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 15:39:16.314 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:d9:82:8e:87:23:a5:86:ef:1e:b7:44:2d:ac:45:54:48:71:d9:27],[56:66:d1:a4] modulus: ab0cc57f6ab58d3e81dea3031e4cfc72a868815fd20fd7c9556f45b695fc4dbd07496b59028111a7ec3961383a1b872329990be6f922d77afc4d0f9f709c7640f1e062274fc34efa9f72f8de1c0a36779de30a87b9c4491fe2b79340dd16b81b3f4832775fc7fd22628b0c1940962631e91c84f3b878df40161ad592775415527084c7959c51bb229845e5e942023d2eea67f60cf5e99998dbf20403c3e5b19af7e95136001aa16b9fd72ed145ca471746d57bb60914e05aea47ed11cc58ef23831aaa9ca0f5d97a37c9ce918f946b63e1041643fde154695511030144f5aeff75b3693cde0c0c753514a40a6d90ddc5fd6c94fd0d586cfea8bde652566797bf public exponent: 10001 ] 2023-01-13 16:51:02.138  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 16:51:02.145 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 16:51:02.154 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-13 16:51:02.157 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 16:51:02.158  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-13 16:51:02.166  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 16:51:02.167  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 16:51:02.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 16:51:02.169 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 16:51:02.170 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 16:51:02.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 16:51:02.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 16:51:02.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 16:51:02.196 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 16:51:02.530  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 16:51:02.531  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 16:51:02.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 16:51:02.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 16:51:02.536  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 16:51:02.537  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 16:51:02.551 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 16:51:02.554 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 16:51:02.555 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 16:51:02.556 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 16:51:02.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 16:51:02.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 16:51:02.558 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 16:51:02.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 16:51:02.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 16:51:02.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 16:51:02.572 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4c:b8:f1:b1:4d:87:aa:b4:0e:3f:4a:c2:a5:42:33:5a:58:c7:6a:01],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 17:00:16.247  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 17:00:16.251 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 17:00:16.256 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 17:00:16.257 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 17:00:16.258  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 17:00:16.268  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 17:00:16.269  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 17:00:16.270 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 17:00:16.270 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 17:00:16.271 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 17:00:16.278 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 17:00:16.280 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 17:00:16.280 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 17:00:16.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:00:16.652  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 17:00:16.653  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 17:00:16.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 17:00:16.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:00:16.656  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 17:00:16.657  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 17:00:16.657 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:16.657 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:16.658 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:16.659 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:16.661 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:16.661 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:16.663 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:16.663 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:16.664 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:16.665 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 17:00:16.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:7c:6b:d8:4a:6d:37:f6:0a:cb:5c:bd:f5:f6:4b:29:4f:51:c3:73],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 17:00:39.791  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 17:00:39.793 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 17:00:39.796 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 17:00:39.798 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 17:00:39.801  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 17:00:39.809  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 17:00:39.810  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 17:00:39.811 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 17:00:39.811 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 17:00:39.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 17:00:39.818 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 17:00:39.820 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 17:00:39.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 17:00:39.825 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:00:40.196  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 17:00:40.197  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 17:00:40.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 17:00:40.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:00:40.207  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 17:00:40.209  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 17:00:40.210 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:40.210 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:40.211 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:40.221 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:40.222 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:40.222 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:40.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:00:40.230 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:00:40.231 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:00:40.237 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 17:00:40.251 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [16:fc:55:34:97:02:28:ec:b5:14:1c:00:fe:7e:f0:3f:63:99:b3:2e],[56:66:d1:a4] modulus: fb43f5f90bac3e096c98181c2744955a5f26b8ba76770626d127a9272a2c8b8a3e65fc0fa43f2fdc0757eb63098e09248c08097b55668854c0514b35fa7fd998047882201b29c0c35772208299a70ddef8c237cfe875b69781035b1b8acf79ed3534c48de998c32793799cebb3bb80d23af5d6882fd839d4ad1fa028e5ea303744e8942ff0fde85948ef2aae04ef7098139cf71d80a242a0cfcfeb5f1c1135ba8d33fc5ad6ff0ca9b873b629c0b06b7b09518c3e2fccb84b2a096fd94d0a7fe3e0cc63e2cba7b2690195523145f9f8a1ad3e92e9b0209ece560aa6c8a42586225b566579e822e20982f32f89ab1581866373845deef5e46f30ee9a3d2ad95f45 public exponent: 10001 ] 2023-01-13 17:30:44.491  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 17:30:44.495 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 17:30:44.500 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 17:30:44.502 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 17:30:44.502  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 17:30:44.503  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 17:30:44.504  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 17:30:44.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 17:30:44.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 17:30:44.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 17:30:44.515 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 17:30:44.517 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 17:30:44.518 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 17:30:44.519 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:30:45.035  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 17:30:45.036  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 17:30:45.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 17:30:45.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:30:45.039  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 17:30:45.039  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 17:30:45.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:45.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:45.041 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:45.042 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:45.042 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:45.043 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:45.044 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:45.044 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:45.044 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:45.054 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 17:30:45.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:22:06:7b:fc:a1:6d:ce:09:0b:f4:85:15:03:63:d6:5a:8d:03:26],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 17:30:51.396  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-13 17:30:51.398 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-13 17:30:51.400 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 17:30:51.400 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 17:30:51.401  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 17:30:51.402  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-13 17:30:51.403  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-13 17:30:51.403 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-13 17:30:51.404 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-13 17:30:51.405 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-13 17:30:51.409 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-13 17:30:51.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 17:30:51.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-13 17:30:51.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:30:51.631  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-13 17:30:51.632  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-13 17:30:51.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-13 17:30:51.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 17:30:51.639  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-13 17:30:51.641  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-13 17:30:51.642 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:51.643 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:51.644 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:51.647 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:51.648 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:51.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:51.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 17:30:51.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-13 17:30:51.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-13 17:30:51.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 17:30:51.658 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286364873338662740772653114455695329549331964962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 11:44:07 UTC 2023 Final Date: Wed Jan 12 11:44:06 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [79:a3:1f:39:b5:f7:b7:65:d9:ce:00:ff:87:7e:aa:f5:dd:86:e2:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 207d3d1fa08297923b71a5e7977e16ee725adf21 91df9767c1da38516e2434c2c7c5c614bc62aad2 7eb1393a9ef92ef91df99c8f2469952d57692335 88d399e8ac379ce4e890a1dae23a83873883e914 1fa9be8ffa0c937b77c2cfa1fb9e3db9e595f1d5 d8696df6c8bf976a625a2b49e01bc26cc013ff1f ff241b2eb33c559385b8dcee7e1385ddecb000d7 067c7e735e52a687f18cc8f699dec2d5d0a2e4b6 8004d01367d31416ff9322ee6f1add62fb0c8075 e673f7ce311a3a8a2b50dc30dfea56f0d25f6bc9 ac946ee41f5f94a08a20b4c62a477f47f1dc555b 82627804041b20c579fded4eb8da30c7124dc67e bb796d2f91690db09350f290a0bc910d8947293e 72be414cd88af78fc962a2183ea6c52c5850a878 e314e8b954774f27a08f3ada79628c0f3e92b620 64393d02662e82cb4e7bec60409f0576e1809e5d c62af088a6f323281bc50549597fa5a5bef4c29d b11de1a4cbcccd5c8db49a0ff01ab49476734a5a a10943f52c7ed15573e90ef54f7213d1a1286c23 03b2f6ae Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:f3:81:e2:da:d6:32:5c:6f:4e:fe:cf:f2:86:17:2a:f5:d6:df:b2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]