2022-06-06 07:52:11,633 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-06 07:52:12,658 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-06 07:52:13.402  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 06, 2022 7:52:15 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 06, 2022 7:52:15 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 06, 2022 7:52:15 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 06, 2022 7:52:15 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-06 07:52:15.974 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-06 07:52:16.272  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-06 07:52:16.441  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-06 07:52:17.215 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-06 07:52:17.218 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-06 07:52:17.220 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-06 07:52:17.224 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-06 07:52:17.265 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-06 07:52:17.269 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-06 07:52:17.401 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-06 07:52:18.117 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 06, 2022 7:52:18 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-06 07:52:19.077  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.395 seconds (JVM running for 10.334) Jun 06, 2022 7:52:39 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-06 07:52:59.643  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-06 07:52:59.660 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-06 07:52:59.701 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-06 07:52:59.705 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 07:52:59.726  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-06 07:52:59.728  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-06 07:52:59.729  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-06 07:52:59.731 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-06 07:52:59.731 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 07:52:59.736 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-06 07:52:59.743 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-06 07:52:59.746 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-06 07:52:59.796 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-06 07:52:59.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 07:52:59.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 07:52:59.810 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 07:53:00.428  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-06 07:53:00.433  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-06 07:53:00.434 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-06 07:53:00.437 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 07:53:00.453  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-06 07:53:00.454  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-06 07:53:00.455 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 07:53:00.455 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 07:53:00.456 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 07:53:00.468 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 07:53:00.469 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 07:53:00.469 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 07:53:00.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 07:53:00.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 07:53:00.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 07:53:00.478 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 07:53:00.507 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 481841933715370739658414556612108716294432054644 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 07:50:09 UTC 2022 Final Date: Sat Jun 05 07:50:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:4b:55:60:95:3e:86:fa:af:57:ab:bc:44:92:a5:e1:39:dd:d3:43] modulus: 9a254099b834d71bb43fa957310b273e55ef877bbf79c8b1d3924d503ebf1e3e7a0f778b6d42c0e28d7136e94385e0bbd4e9caef38f5b3dad95c064c27aececfdaa39c8f52287895d0af02882bff562b4c61dcf06110fdac8ee1f59e9d29b9a3f6bd67b05574c1fa752744491a14d10d868fd1965a3d96e7e74c5852e11b503a16800b13b557bbc4f348738dd29b78503c7b2b1fdb334d665316dc0f6fa8b23a0c7ea945de0a5949d6e8dfbf15fea4f57cf04862b58aac6e042e2d5454a0d32b368834360ca2bd1e1937029c21c299e7a0fd39a1cfc70861b670d37c1b754805ceb7ac03e80b221231b45b0e2547ff498807d521309dedc20de66a0f4d55a796a67de4cece2c232850f6c79613d876e00b0547f465150285d0b9962e27b2db5b9cf64665188ca4f1a79ec21b41596d3171777ea253428d93a32019b724738424f665012ba1781fe790a19ffcc15e800caa9f7dd781da010822ee61c7ebda502a8cf9217f23db1a10ef536ad5d22be082f18cc1259564998d33f123e0ec0581ef public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 688c2ffdb1a8c6e14db5991cb691b73b8a2ceed7 9d6552daceb51d900ad61254e3d3a19413199905 e211230b1a1190db6bfceaeb9dc60c30d89a1fb9 1f4e1a2ed786ed8aed04a72849433ad8e07107a5 27b00f25205b3abe068ad8dc020a40354a76ab40 88fbd5b47d6f9addcc57812199e1e016353c25dc 2ffcf881606ccfce56fd2f66e6ed340d83fc7470 1d32769f0e782af099ede07f5b3b9454fa91bc9b b584526d0f860a75bfddd92d7a738a38579251c3 53a5a79bf0a4e83d61a6ef65d0c6f274886624cd 1aa374f371cfdca048a0f84f5a1eaa17921b31b2 7f54c2be8934a13c0879b378da9a81ece327a2c2 72259eb3d36444423f399ccd771efaad0b3694fe 6dcfe6e54cd985612ffb1010be449ca0227851f5 4cc3ada18b6d2909bd342a7e74ec31388d746d25 72f6dbad98c765be289aadd4ea7ef34e8783f2c9 e28a15084394a90d4d91edaeaeab867ceddac4d0 7eb41d5766e9d0c7d5c5ee78ad9b5b9dfec15446 3476369d026a13021604ddeb87e27da9b68ac538 9541907b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ec:e3:aa:3d:ca:fd:4c:40:d3:39:71:fa:87:57:6c:0f:4f:e3:0c:fa] modulus: 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 public exponent: 10001 ] 2022-06-06 09:54:45.990  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-06 09:54:45.995 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-06 09:54:45.999 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 09:54:46.000 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 09:54:46.001  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 09:54:46.002  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-06 09:54:46.002  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-06 09:54:46.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-06 09:54:46.004 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-06 09:54:46.004 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-06 09:54:46.017 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-06 09:54:46.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 09:54:46.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 09:54:46.020 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 09:54:46.253  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-06 09:54:46.254  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-06 09:54:46.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-06 09:54:46.255 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 09:54:46.258  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-06 09:54:46.258  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-06 09:54:46.259 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 09:54:46.259 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 09:54:46.260 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 09:54:46.261 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 09:54:46.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 09:54:46.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 09:54:46.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 09:54:46.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 09:54:46.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 09:54:46.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 09:54:46.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 481841933715370739658414556612108716294432054644 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 07:50:09 UTC 2022 Final Date: Sat Jun 05 07:50:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:4b:55:60:95:3e:86:fa:af:57:ab:bc:44:92:a5:e1:39:dd:d3:43] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 688c2ffdb1a8c6e14db5991cb691b73b8a2ceed7 9d6552daceb51d900ad61254e3d3a19413199905 e211230b1a1190db6bfceaeb9dc60c30d89a1fb9 1f4e1a2ed786ed8aed04a72849433ad8e07107a5 27b00f25205b3abe068ad8dc020a40354a76ab40 88fbd5b47d6f9addcc57812199e1e016353c25dc 2ffcf881606ccfce56fd2f66e6ed340d83fc7470 1d32769f0e782af099ede07f5b3b9454fa91bc9b b584526d0f860a75bfddd92d7a738a38579251c3 53a5a79bf0a4e83d61a6ef65d0c6f274886624cd 1aa374f371cfdca048a0f84f5a1eaa17921b31b2 7f54c2be8934a13c0879b378da9a81ece327a2c2 72259eb3d36444423f399ccd771efaad0b3694fe 6dcfe6e54cd985612ffb1010be449ca0227851f5 4cc3ada18b6d2909bd342a7e74ec31388d746d25 72f6dbad98c765be289aadd4ea7ef34e8783f2c9 e28a15084394a90d4d91edaeaeab867ceddac4d0 7eb41d5766e9d0c7d5c5ee78ad9b5b9dfec15446 3476369d026a13021604ddeb87e27da9b68ac538 9541907b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:b6:de:36:2b:de:5f:28:e4:ad:61:28:94:16:24:82:66:dd:fb:d0] modulus: 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 public exponent: 10001 ] 2022-06-06 09:56:33.460  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-06 09:56:33.461 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-06 09:56:33.463 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-06 09:56:33.464 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 09:56:33.465  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-06 09:56:33.466  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-06 09:56:33.466  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-06 09:56:33.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-06 09:56:33.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-06 09:56:33.469 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-06 09:56:33.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-06 09:56:33.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 09:56:33.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 09:56:33.485 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 09:56:33.686  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-06 09:56:33.687  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-06 09:56:33.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-06 09:56:33.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 09:56:33.691  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-06 09:56:33.691  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-06 09:56:33.692 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 09:56:33.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 09:56:33.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 09:56:33.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 09:56:33.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 09:56:33.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 09:56:33.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 09:56:33.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 09:56:33.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 09:56:33.699 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 09:56:33.703 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 481841933715370739658414556612108716294432054644 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 07:50:09 UTC 2022 Final Date: Sat Jun 05 07:50:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:4b:55:60:95:3e:86:fa:af:57:ab:bc:44:92:a5:e1:39:dd:d3:43] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 688c2ffdb1a8c6e14db5991cb691b73b8a2ceed7 9d6552daceb51d900ad61254e3d3a19413199905 e211230b1a1190db6bfceaeb9dc60c30d89a1fb9 1f4e1a2ed786ed8aed04a72849433ad8e07107a5 27b00f25205b3abe068ad8dc020a40354a76ab40 88fbd5b47d6f9addcc57812199e1e016353c25dc 2ffcf881606ccfce56fd2f66e6ed340d83fc7470 1d32769f0e782af099ede07f5b3b9454fa91bc9b b584526d0f860a75bfddd92d7a738a38579251c3 53a5a79bf0a4e83d61a6ef65d0c6f274886624cd 1aa374f371cfdca048a0f84f5a1eaa17921b31b2 7f54c2be8934a13c0879b378da9a81ece327a2c2 72259eb3d36444423f399ccd771efaad0b3694fe 6dcfe6e54cd985612ffb1010be449ca0227851f5 4cc3ada18b6d2909bd342a7e74ec31388d746d25 72f6dbad98c765be289aadd4ea7ef34e8783f2c9 e28a15084394a90d4d91edaeaeab867ceddac4d0 7eb41d5766e9d0c7d5c5ee78ad9b5b9dfec15446 3476369d026a13021604ddeb87e27da9b68ac538 9541907b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0c:dc:ea:25:93:4c:79:bd:18:49:c0:3c:73:e8:10:68:f1:26:e5:53] modulus: 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 public exponent: 10001 ] 2022-06-06 09:57:57.564  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-06 09:57:57.566 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-06 09:57:57.567 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-06 09:57:57.568 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 09:57:57.568  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-06 09:57:57.569  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-06 09:57:57.570  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-06 09:57:57.570 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-06 09:57:57.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-06 09:57:57.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-06 09:57:57.578 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-06 09:57:57.579 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 09:57:57.579 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 09:57:57.580 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 09:57:57.727  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-06 09:57:57.728  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-06 09:57:57.729 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-06 09:57:57.729 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 09:57:57.732  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-06 09:57:57.732  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-06 09:57:57.733 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 09:57:57.733 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 09:57:57.734 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 09:57:57.735 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 09:57:57.735 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 09:57:57.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 09:57:57.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 09:57:57.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 09:57:57.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 09:57:57.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 09:57:57.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 481841933715370739658414556612108716294432054644 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 07:50:09 UTC 2022 Final Date: Sat Jun 05 07:50:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:4b:55:60:95:3e:86:fa:af:57:ab:bc:44:92:a5:e1:39:dd:d3:43] modulus: 9a254099b834d71bb43fa957310b273e55ef877bbf79c8b1d3924d503ebf1e3e7a0f778b6d42c0e28d7136e94385e0bbd4e9caef38f5b3dad95c064c27aececfdaa39c8f52287895d0af02882bff562b4c61dcf06110fdac8ee1f59e9d29b9a3f6bd67b05574c1fa752744491a14d10d868fd1965a3d96e7e74c5852e11b503a16800b13b557bbc4f348738dd29b78503c7b2b1fdb334d665316dc0f6fa8b23a0c7ea945de0a5949d6e8dfbf15fea4f57cf04862b58aac6e042e2d5454a0d32b368834360ca2bd1e1937029c21c299e7a0fd39a1cfc70861b670d37c1b754805ceb7ac03e80b221231b45b0e2547ff498807d521309dedc20de66a0f4d55a796a67de4cece2c232850f6c79613d876e00b0547f465150285d0b9962e27b2db5b9cf64665188ca4f1a79ec21b41596d3171777ea253428d93a32019b724738424f665012ba1781fe790a19ffcc15e800caa9f7dd781da010822ee61c7ebda502a8cf9217f23db1a10ef536ad5d22be082f18cc1259564998d33f123e0ec0581ef public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 688c2ffdb1a8c6e14db5991cb691b73b8a2ceed7 9d6552daceb51d900ad61254e3d3a19413199905 e211230b1a1190db6bfceaeb9dc60c30d89a1fb9 1f4e1a2ed786ed8aed04a72849433ad8e07107a5 27b00f25205b3abe068ad8dc020a40354a76ab40 88fbd5b47d6f9addcc57812199e1e016353c25dc 2ffcf881606ccfce56fd2f66e6ed340d83fc7470 1d32769f0e782af099ede07f5b3b9454fa91bc9b b584526d0f860a75bfddd92d7a738a38579251c3 53a5a79bf0a4e83d61a6ef65d0c6f274886624cd 1aa374f371cfdca048a0f84f5a1eaa17921b31b2 7f54c2be8934a13c0879b378da9a81ece327a2c2 72259eb3d36444423f399ccd771efaad0b3694fe 6dcfe6e54cd985612ffb1010be449ca0227851f5 4cc3ada18b6d2909bd342a7e74ec31388d746d25 72f6dbad98c765be289aadd4ea7ef34e8783f2c9 e28a15084394a90d4d91edaeaeab867ceddac4d0 7eb41d5766e9d0c7d5c5ee78ad9b5b9dfec15446 3476369d026a13021604ddeb87e27da9b68ac538 9541907b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:ad:83:fd:94:67:1b:3a:59:83:e6:74:70:09:04:af:23:50:2d:a5] modulus: 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 public exponent: 10001 ] 2022-06-06 10:01:07.735  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-06 10:01:07.737 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-06 10:01:07.742 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 10:01:07.745 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 10:01:07.746  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-06 10:01:07.747  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-06 10:01:07.748  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-06 10:01:07.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-06 10:01:07.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-06 10:01:07.750 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-06 10:01:07.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-06 10:01:07.758 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 10:01:07.758 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 10:01:07.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:01:07.914  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-06 10:01:07.915  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-06 10:01:07.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-06 10:01:07.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:01:07.917  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-06 10:01:07.918  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-06 10:01:07.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:01:07.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:01:07.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:01:07.920 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:01:07.920 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:01:07.921 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:01:07.922 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:01:07.922 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:01:07.922 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:01:07.923 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 10:01:07.927 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 481841933715370739658414556612108716294432054644 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 07:50:09 UTC 2022 Final Date: Sat Jun 05 07:50:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:4b:55:60:95:3e:86:fa:af:57:ab:bc:44:92:a5:e1:39:dd:d3:43] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 688c2ffdb1a8c6e14db5991cb691b73b8a2ceed7 9d6552daceb51d900ad61254e3d3a19413199905 e211230b1a1190db6bfceaeb9dc60c30d89a1fb9 1f4e1a2ed786ed8aed04a72849433ad8e07107a5 27b00f25205b3abe068ad8dc020a40354a76ab40 88fbd5b47d6f9addcc57812199e1e016353c25dc 2ffcf881606ccfce56fd2f66e6ed340d83fc7470 1d32769f0e782af099ede07f5b3b9454fa91bc9b b584526d0f860a75bfddd92d7a738a38579251c3 53a5a79bf0a4e83d61a6ef65d0c6f274886624cd 1aa374f371cfdca048a0f84f5a1eaa17921b31b2 7f54c2be8934a13c0879b378da9a81ece327a2c2 72259eb3d36444423f399ccd771efaad0b3694fe 6dcfe6e54cd985612ffb1010be449ca0227851f5 4cc3ada18b6d2909bd342a7e74ec31388d746d25 72f6dbad98c765be289aadd4ea7ef34e8783f2c9 e28a15084394a90d4d91edaeaeab867ceddac4d0 7eb41d5766e9d0c7d5c5ee78ad9b5b9dfec15446 3476369d026a13021604ddeb87e27da9b68ac538 9541907b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:b6:14:db:5b:45:1b:12:7c:79:ce:a1:81:51:79:fa:e5:98:cd:f2] modulus: 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 public exponent: 10001 ] 2022-06-06 10:23:04.918  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-06 10:23:04.922 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-06 10:23:04.926 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-06 10:23:04.927 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 10:23:04.928  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-06 10:23:04.929  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-06 10:23:04.929  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-06 10:23:04.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-06 10:23:04.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-06 10:23:04.932 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-06 10:23:04.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-06 10:23:04.941 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 10:23:04.941 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 10:23:04.941 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:23:05.204  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-06 10:23:05.205  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-06 10:23:05.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-06 10:23:05.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:23:05.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-06 10:23:05.209  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-06 10:23:05.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:23:05.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:23:05.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:23:05.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:23:05.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:23:05.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:23:05.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:23:05.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:23:05.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:23:05.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 10:23:05.220 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 481841933715370739658414556612108716294432054644 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 07:50:09 UTC 2022 Final Date: Sat Jun 05 07:50:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:4b:55:60:95:3e:86:fa:af:57:ab:bc:44:92:a5:e1:39:dd:d3:43] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 688c2ffdb1a8c6e14db5991cb691b73b8a2ceed7 9d6552daceb51d900ad61254e3d3a19413199905 e211230b1a1190db6bfceaeb9dc60c30d89a1fb9 1f4e1a2ed786ed8aed04a72849433ad8e07107a5 27b00f25205b3abe068ad8dc020a40354a76ab40 88fbd5b47d6f9addcc57812199e1e016353c25dc 2ffcf881606ccfce56fd2f66e6ed340d83fc7470 1d32769f0e782af099ede07f5b3b9454fa91bc9b b584526d0f860a75bfddd92d7a738a38579251c3 53a5a79bf0a4e83d61a6ef65d0c6f274886624cd 1aa374f371cfdca048a0f84f5a1eaa17921b31b2 7f54c2be8934a13c0879b378da9a81ece327a2c2 72259eb3d36444423f399ccd771efaad0b3694fe 6dcfe6e54cd985612ffb1010be449ca0227851f5 4cc3ada18b6d2909bd342a7e74ec31388d746d25 72f6dbad98c765be289aadd4ea7ef34e8783f2c9 e28a15084394a90d4d91edaeaeab867ceddac4d0 7eb41d5766e9d0c7d5c5ee78ad9b5b9dfec15446 3476369d026a13021604ddeb87e27da9b68ac538 9541907b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:eb:1f:57:9d:7a:2a:20:dd:8e:34:3b:98:d8:65:60:73:c6:58:17] modulus: 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 public exponent: 10001 ] 2022-06-06 10:29:23.613  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-06 10:29:23.616 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-06 10:29:23.619 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-06 10:29:23.620 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 10:29:23.621  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-06 10:29:23.622  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-06 10:29:23.623  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-06 10:29:23.623 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-06 10:29:23.624 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-06 10:29:23.625 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-06 10:29:23.632 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-06 10:29:23.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 10:29:23.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 10:29:23.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:29:23.897  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-06 10:29:23.898  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-06 10:29:23.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-06 10:29:23.899 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:29:23.900  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-06 10:29:23.901  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-06 10:29:23.901 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:29:23.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:29:23.902 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:29:23.903 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:29:23.903 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:29:23.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:29:23.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:29:23.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:29:23.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:29:23.906 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 10:29:23.910 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 481841933715370739658414556612108716294432054644 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 07:50:09 UTC 2022 Final Date: Sat Jun 05 07:50:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:4b:55:60:95:3e:86:fa:af:57:ab:bc:44:92:a5:e1:39:dd:d3:43] modulus: 9a254099b834d71bb43fa957310b273e55ef877bbf79c8b1d3924d503ebf1e3e7a0f778b6d42c0e28d7136e94385e0bbd4e9caef38f5b3dad95c064c27aececfdaa39c8f52287895d0af02882bff562b4c61dcf06110fdac8ee1f59e9d29b9a3f6bd67b05574c1fa752744491a14d10d868fd1965a3d96e7e74c5852e11b503a16800b13b557bbc4f348738dd29b78503c7b2b1fdb334d665316dc0f6fa8b23a0c7ea945de0a5949d6e8dfbf15fea4f57cf04862b58aac6e042e2d5454a0d32b368834360ca2bd1e1937029c21c299e7a0fd39a1cfc70861b670d37c1b754805ceb7ac03e80b221231b45b0e2547ff498807d521309dedc20de66a0f4d55a796a67de4cece2c232850f6c79613d876e00b0547f465150285d0b9962e27b2db5b9cf64665188ca4f1a79ec21b41596d3171777ea253428d93a32019b724738424f665012ba1781fe790a19ffcc15e800caa9f7dd781da010822ee61c7ebda502a8cf9217f23db1a10ef536ad5d22be082f18cc1259564998d33f123e0ec0581ef public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 688c2ffdb1a8c6e14db5991cb691b73b8a2ceed7 9d6552daceb51d900ad61254e3d3a19413199905 e211230b1a1190db6bfceaeb9dc60c30d89a1fb9 1f4e1a2ed786ed8aed04a72849433ad8e07107a5 27b00f25205b3abe068ad8dc020a40354a76ab40 88fbd5b47d6f9addcc57812199e1e016353c25dc 2ffcf881606ccfce56fd2f66e6ed340d83fc7470 1d32769f0e782af099ede07f5b3b9454fa91bc9b b584526d0f860a75bfddd92d7a738a38579251c3 53a5a79bf0a4e83d61a6ef65d0c6f274886624cd 1aa374f371cfdca048a0f84f5a1eaa17921b31b2 7f54c2be8934a13c0879b378da9a81ece327a2c2 72259eb3d36444423f399ccd771efaad0b3694fe 6dcfe6e54cd985612ffb1010be449ca0227851f5 4cc3ada18b6d2909bd342a7e74ec31388d746d25 72f6dbad98c765be289aadd4ea7ef34e8783f2c9 e28a15084394a90d4d91edaeaeab867ceddac4d0 7eb41d5766e9d0c7d5c5ee78ad9b5b9dfec15446 3476369d026a13021604ddeb87e27da9b68ac538 9541907b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0b:88:62:b4:d9:f1:61:f2:aa:c9:5c:a1:cd:af:cf:46:1d:f6:d1:ef] modulus: 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 public exponent: 10001 ] 2022-06-06 10:29:38.394  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-06 10:29:38.397 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-06 10:29:38.399 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-06 10:29:38.400 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-06 10:29:38.401  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-06 10:29:38.402  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-06 10:29:38.403  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-06 10:29:38.404 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-06 10:29:38.404 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-06 10:29:38.407 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-06 10:29:38.412 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-06 10:29:38.413 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 10:29:38.414 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-06 10:29:38.414 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:29:38.541  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-06 10:29:38.542  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-06 10:29:38.542 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-06 10:29:38.542 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-06 10:29:38.544  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-06 10:29:38.544  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-06 10:29:38.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:29:38.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:29:38.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:29:38.546 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:29:38.546 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:29:38.547 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:29:38.547 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-06 10:29:38.548 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-06 10:29:38.548 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-06 10:29:38.549 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-06 10:29:38.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 481841933715370739658414556612108716294432054644 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 06 07:50:09 UTC 2022 Final Date: Sat Jun 05 07:50:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9b:4b:55:60:95:3e:86:fa:af:57:ab:bc:44:92:a5:e1:39:dd:d3:43] modulus: 9a254099b834d71bb43fa957310b273e55ef877bbf79c8b1d3924d503ebf1e3e7a0f778b6d42c0e28d7136e94385e0bbd4e9caef38f5b3dad95c064c27aececfdaa39c8f52287895d0af02882bff562b4c61dcf06110fdac8ee1f59e9d29b9a3f6bd67b05574c1fa752744491a14d10d868fd1965a3d96e7e74c5852e11b503a16800b13b557bbc4f348738dd29b78503c7b2b1fdb334d665316dc0f6fa8b23a0c7ea945de0a5949d6e8dfbf15fea4f57cf04862b58aac6e042e2d5454a0d32b368834360ca2bd1e1937029c21c299e7a0fd39a1cfc70861b670d37c1b754805ceb7ac03e80b221231b45b0e2547ff498807d521309dedc20de66a0f4d55a796a67de4cece2c232850f6c79613d876e00b0547f465150285d0b9962e27b2db5b9cf64665188ca4f1a79ec21b41596d3171777ea253428d93a32019b724738424f665012ba1781fe790a19ffcc15e800caa9f7dd781da010822ee61c7ebda502a8cf9217f23db1a10ef536ad5d22be082f18cc1259564998d33f123e0ec0581ef public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 688c2ffdb1a8c6e14db5991cb691b73b8a2ceed7 9d6552daceb51d900ad61254e3d3a19413199905 e211230b1a1190db6bfceaeb9dc60c30d89a1fb9 1f4e1a2ed786ed8aed04a72849433ad8e07107a5 27b00f25205b3abe068ad8dc020a40354a76ab40 88fbd5b47d6f9addcc57812199e1e016353c25dc 2ffcf881606ccfce56fd2f66e6ed340d83fc7470 1d32769f0e782af099ede07f5b3b9454fa91bc9b b584526d0f860a75bfddd92d7a738a38579251c3 53a5a79bf0a4e83d61a6ef65d0c6f274886624cd 1aa374f371cfdca048a0f84f5a1eaa17921b31b2 7f54c2be8934a13c0879b378da9a81ece327a2c2 72259eb3d36444423f399ccd771efaad0b3694fe 6dcfe6e54cd985612ffb1010be449ca0227851f5 4cc3ada18b6d2909bd342a7e74ec31388d746d25 72f6dbad98c765be289aadd4ea7ef34e8783f2c9 e28a15084394a90d4d91edaeaeab867ceddac4d0 7eb41d5766e9d0c7d5c5ee78ad9b5b9dfec15446 3476369d026a13021604ddeb87e27da9b68ac538 9541907b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:b6:70:a5:47:cb:f5:2e:04:22:87:14:80:0a:47:59:ab:cf:b3:e8] modulus: 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 public exponent: 10001 ]