2022-07-14 05:21:22,723 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-14 05:21:24,196 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-14 05:21:25.111  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jul 14, 2022 5:21:27 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 14, 2022 5:21:27 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 14, 2022 5:21:27 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 14, 2022 5:21:27 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-14 05:21:28.235 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-14 05:21:28.534  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-07-14 05:21:28.695  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-14 05:21:29.396 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-14 05:21:29.399 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-07-14 05:21:29.400 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-14 05:21:29.403 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-14 05:21:29.442 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-14 05:21:29.445 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-07-14 05:21:29.555 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-07-14 05:21:30.271 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 14, 2022 5:21:30 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-14 05:21:31.168  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.44 seconds (JVM running for 11.249) Jul 14, 2022 5:21:54 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-14 05:22:29.394  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:22:29.414 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:22:29.453 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-14 05:22:29.459 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:22:29.476  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-14 05:22:29.478  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:22:29.479  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:22:29.480 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:22:29.481 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:22:29.485 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:22:29.491 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:22:29.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:22:29.540 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:22:29.544 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:22:29.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:22:29.548 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:22:30.176  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:22:30.179  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:22:30.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:22:30.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:22:30.190  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:22:30.191  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:22:30.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:22:30.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:22:30.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:22:30.208 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:22:30.209 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:22:30.209 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:22:30.217 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:22:30.217 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:22:30.218 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:22:30.220 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:22:30.251 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 569746507354148421169240786320320469131142577229 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 05:18:47 UTC 2022 Final Date: Tue Jul 13 05:18:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:77:e7:64:a2:24:64:31:66:b7:96:1f:af:b2:1e:aa:21:d7:e6:30] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16950296e6426cc377dfd911b60969f31765b68a 7613d87cbc05c088c6e56a86c9e62dca9006cb2d 6ebd05f80320a1be5d44734c81e3869721e5d563 e6f3de70093c5bc8e3e171065b3baf054f793b88 d241ef1aaa22d4ba28cdd3d717698f7ac2782b56 ae0ede6efbc017d0b778ac57c5c9b127861841b2 47d8cb8f6fbc2c1f6c9e8787647e16a4cb0bbddc 0766bc0c6eb068f183e23d42f2b1815b11395eb1 a6c21214171a092ff68bf6bac97f1e8ec94e9e48 89c7dc5a586d00c35d74d6515294e2ff2a158eb7 42a38c2bd221f478cd6d61af231d166ad80e8fca 5d1614d44a03d4e3f5cc1ede579ce805c3c3bfce 37319cd6e450285e1eb8602f2c8b70e2a86ca09a 9cc50dc777763829b4d2c246b2eeb9891f2b3534 fab8be7c3269fce897d71288abede05a8967cb59 6eb7e7a1143abf50eb73391e243bfb9adfae5a4e 5dd482398247a41688d989cf9330bc05ec324de8 220123e9e6ab0780036c2583ecac79f96977cc9d 9cef9118376e15b06d72d3187e31f6c7f4705ecf 5383c0e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:59:55:ca:e8:34:68:92:dd:be:0b:ee:38:8c:05:44:e3:73:3d:a8] modulus: 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 public exponent: 10001 ] 2022-07-14 06:54:59.657  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 06:54:59.660 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 06:54:59.664 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 06:54:59.665 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 06:54:59.666  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 06:54:59.666  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 06:54:59.667  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 06:54:59.667 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 06:54:59.668 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 06:54:59.669 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 06:54:59.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 06:54:59.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 06:54:59.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 06:54:59.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 06:55:00.003  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 06:55:00.004  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 06:55:00.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 06:55:00.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 06:55:00.010  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 06:55:00.011  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 06:55:00.012 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 06:55:00.012 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 06:55:00.013 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 06:55:00.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 06:55:00.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 06:55:00.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 06:55:00.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 06:55:00.018 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 06:55:00.019 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 06:55:00.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 06:55:00.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 569746507354148421169240786320320469131142577229 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 05:18:47 UTC 2022 Final Date: Tue Jul 13 05:18:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:77:e7:64:a2:24:64:31:66:b7:96:1f:af:b2:1e:aa:21:d7:e6:30] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16950296e6426cc377dfd911b60969f31765b68a 7613d87cbc05c088c6e56a86c9e62dca9006cb2d 6ebd05f80320a1be5d44734c81e3869721e5d563 e6f3de70093c5bc8e3e171065b3baf054f793b88 d241ef1aaa22d4ba28cdd3d717698f7ac2782b56 ae0ede6efbc017d0b778ac57c5c9b127861841b2 47d8cb8f6fbc2c1f6c9e8787647e16a4cb0bbddc 0766bc0c6eb068f183e23d42f2b1815b11395eb1 a6c21214171a092ff68bf6bac97f1e8ec94e9e48 89c7dc5a586d00c35d74d6515294e2ff2a158eb7 42a38c2bd221f478cd6d61af231d166ad80e8fca 5d1614d44a03d4e3f5cc1ede579ce805c3c3bfce 37319cd6e450285e1eb8602f2c8b70e2a86ca09a 9cc50dc777763829b4d2c246b2eeb9891f2b3534 fab8be7c3269fce897d71288abede05a8967cb59 6eb7e7a1143abf50eb73391e243bfb9adfae5a4e 5dd482398247a41688d989cf9330bc05ec324de8 220123e9e6ab0780036c2583ecac79f96977cc9d 9cef9118376e15b06d72d3187e31f6c7f4705ecf 5383c0e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:00:77:50:9d:3e:5c:56:5e:c9:6d:25:27:c5:73:88:75:65:b4:69] modulus: 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 public exponent: 10001 ] 2022-07-14 06:56:47.258  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 06:56:47.261 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 06:56:47.271 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-14 06:56:47.273 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 06:56:47.274  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-14 06:56:47.275  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 06:56:47.275  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 06:56:47.276 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 06:56:47.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 06:56:47.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 06:56:47.287 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 06:56:47.288 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 06:56:47.289 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 06:56:47.289 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 06:56:47.479  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 06:56:47.480  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 06:56:47.480 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 06:56:47.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 06:56:47.485  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 06:56:47.485  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 06:56:47.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 06:56:47.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 06:56:47.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 06:56:47.488 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 06:56:47.488 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 06:56:47.489 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 06:56:47.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 06:56:47.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 06:56:47.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 06:56:47.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 06:56:47.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 569746507354148421169240786320320469131142577229 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 05:18:47 UTC 2022 Final Date: Tue Jul 13 05:18:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:77:e7:64:a2:24:64:31:66:b7:96:1f:af:b2:1e:aa:21:d7:e6:30] modulus: bfb9861fc66111aef66601fee5405b84df6dfc3ae52db400bae528ed3f5bbc14d5539bd978ee5714e60aa718e2e39109b734813d7b71cea12d2a6908d19b3fbc085069d147a546eedd01ffeaafd343b7d622456a5c2f5fcd2bfc5de35bebb22f7599aae0ff272abdbb33bd714f5105f41e4e67f4fe450b4c0612889e86b074899e4cbdb5e9f65ac19f90074cfac48e37c1acdcfc5f38da42066b75d9b8195a91e5f3fa98f12697b118c3eb9bd03428a048c5ea1456ac780459992755f6025269fb63d936dcbc340a440affcf696625591bf97353f235af530f84b97a07ba89a1f5a83626e5b069f0068c2a728cb13df6ec0bd7a55f99ca1892fbe918429b454f485663c5288a7d9103d4206fcce2e512d1f9f7aca742b82207eeff0aa607c1d7bafc31a92473865b35c3078f20c8f6f2e83d40a9cb60c884b62a3c175bab8d7ff56eb4fb6a7bb50cd2bc7cdf8b13ce1406096862e0dcda1c9f40246412be017567968e0230f3ed25a272344a13c9513fb697fc630fb96ad3490a38b02acc4df1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16950296e6426cc377dfd911b60969f31765b68a 7613d87cbc05c088c6e56a86c9e62dca9006cb2d 6ebd05f80320a1be5d44734c81e3869721e5d563 e6f3de70093c5bc8e3e171065b3baf054f793b88 d241ef1aaa22d4ba28cdd3d717698f7ac2782b56 ae0ede6efbc017d0b778ac57c5c9b127861841b2 47d8cb8f6fbc2c1f6c9e8787647e16a4cb0bbddc 0766bc0c6eb068f183e23d42f2b1815b11395eb1 a6c21214171a092ff68bf6bac97f1e8ec94e9e48 89c7dc5a586d00c35d74d6515294e2ff2a158eb7 42a38c2bd221f478cd6d61af231d166ad80e8fca 5d1614d44a03d4e3f5cc1ede579ce805c3c3bfce 37319cd6e450285e1eb8602f2c8b70e2a86ca09a 9cc50dc777763829b4d2c246b2eeb9891f2b3534 fab8be7c3269fce897d71288abede05a8967cb59 6eb7e7a1143abf50eb73391e243bfb9adfae5a4e 5dd482398247a41688d989cf9330bc05ec324de8 220123e9e6ab0780036c2583ecac79f96977cc9d 9cef9118376e15b06d72d3187e31f6c7f4705ecf 5383c0e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:aa:22:c7:67:fa:68:66:c9:ca:c5:f1:3e:d7:78:84:c7:b1:11:5c] modulus: a077e060b3c1391dd3ee6191aeff3c0d291312f43b4c69c89ff6640f84eee33af8b806169843aa77331cf8c54aa58cfca0797b3d086b497f5475e7499027b82045eef782584946391f47655d7e10962fac6a3769f89439d00812ce61130c38e0c5522900d32f577e3fc0aa64e660b8d186b6c5961262fb46f7c05a2035fc87d17434c8133048960a9322e65bf9cbdbcb870ffaebc04c9bc4823bf1e66fb5d19f349e3374fedad91abc2924b8280c3c3c0bf0af6d8d70b1132221f09ea16e85751ebb391bca413143b6629633f274db9b6cdd0b709a1421d5cf411ff356c6054af841a28d545ad3e7e6fa5b1239168f7771340e90744c203d1f08b4e4e53d7405 public exponent: 10001 ] 2022-07-14 06:57:58.974  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 06:57:58.976 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 06:57:58.978 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-14 06:57:58.979 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 06:57:58.980  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-14 06:57:58.982  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 06:57:58.983  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 06:57:58.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 06:57:58.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 06:57:58.986 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 06:57:58.993 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 06:57:58.994 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 06:57:58.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 06:57:58.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 06:57:59.179  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 06:57:59.180  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 06:57:59.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 06:57:59.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 06:57:59.183  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 06:57:59.184  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 06:57:59.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 06:57:59.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 06:57:59.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 06:57:59.187 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 06:57:59.188 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 06:57:59.188 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 06:57:59.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 06:57:59.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 06:57:59.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 06:57:59.193 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 06:57:59.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 569746507354148421169240786320320469131142577229 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 05:18:47 UTC 2022 Final Date: Tue Jul 13 05:18:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:77:e7:64:a2:24:64:31:66:b7:96:1f:af:b2:1e:aa:21:d7:e6:30] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16950296e6426cc377dfd911b60969f31765b68a 7613d87cbc05c088c6e56a86c9e62dca9006cb2d 6ebd05f80320a1be5d44734c81e3869721e5d563 e6f3de70093c5bc8e3e171065b3baf054f793b88 d241ef1aaa22d4ba28cdd3d717698f7ac2782b56 ae0ede6efbc017d0b778ac57c5c9b127861841b2 47d8cb8f6fbc2c1f6c9e8787647e16a4cb0bbddc 0766bc0c6eb068f183e23d42f2b1815b11395eb1 a6c21214171a092ff68bf6bac97f1e8ec94e9e48 89c7dc5a586d00c35d74d6515294e2ff2a158eb7 42a38c2bd221f478cd6d61af231d166ad80e8fca 5d1614d44a03d4e3f5cc1ede579ce805c3c3bfce 37319cd6e450285e1eb8602f2c8b70e2a86ca09a 9cc50dc777763829b4d2c246b2eeb9891f2b3534 fab8be7c3269fce897d71288abede05a8967cb59 6eb7e7a1143abf50eb73391e243bfb9adfae5a4e 5dd482398247a41688d989cf9330bc05ec324de8 220123e9e6ab0780036c2583ecac79f96977cc9d 9cef9118376e15b06d72d3187e31f6c7f4705ecf 5383c0e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:06:14:2f:59:3d:a4:ad:8c:8b:6e:24:be:3e:be:f9:e4:22:d3:49] modulus: 9656bbd6e5b3e3aa2f9fd5af75f3df505202523c6174cebbb4ce525e30e461d0fb63a00d2063dc20beb22ed409330c80509caf2b2f7e820141d255448aa48ea9c7df73563feef159b7ec05a056688de833e901edbaadc94f3fae5d2acf3f4aa6f44339ca79ddc58927a3b59f36e83f7c1eea977bc03c93148d62f4688a10a78c1b8e410a3ecd9b2a03a342d09093eaa52e0521426c12278d4bb8dc0c78e6080903684f109c62320710e301f9229cedb6ce3054cfa45f1d7d7edec12dd9d1f0d62bb3aab041c4c272d7045e539968ccd6598983243c041fc7f8c6973fac241024ef22d066f37d10b5c1edbec12bf29ae41e65729906b8ae829a8a82c4ea592659 public exponent: 10001 ] 2022-07-14 07:00:45.490  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 07:00:45.491 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 07:00:45.492 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 07:00:45.493 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 07:00:45.494  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 07:00:45.495  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 07:00:45.495  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 07:00:45.496 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 07:00:45.496 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 07:00:45.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 07:00:45.502 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 07:00:45.503 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 07:00:45.504 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 07:00:45.504 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 07:00:45.714  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 07:00:45.714  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 07:00:45.715 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 07:00:45.715 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 07:00:45.717  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 07:00:45.718  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 07:00:45.719 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:00:45.719 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:00:45.720 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:00:45.721 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:00:45.728 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:00:45.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:00:45.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:00:45.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:00:45.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:00:45.733 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 07:00:45.739 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 569746507354148421169240786320320469131142577229 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 05:18:47 UTC 2022 Final Date: Tue Jul 13 05:18:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:77:e7:64:a2:24:64:31:66:b7:96:1f:af:b2:1e:aa:21:d7:e6:30] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16950296e6426cc377dfd911b60969f31765b68a 7613d87cbc05c088c6e56a86c9e62dca9006cb2d 6ebd05f80320a1be5d44734c81e3869721e5d563 e6f3de70093c5bc8e3e171065b3baf054f793b88 d241ef1aaa22d4ba28cdd3d717698f7ac2782b56 ae0ede6efbc017d0b778ac57c5c9b127861841b2 47d8cb8f6fbc2c1f6c9e8787647e16a4cb0bbddc 0766bc0c6eb068f183e23d42f2b1815b11395eb1 a6c21214171a092ff68bf6bac97f1e8ec94e9e48 89c7dc5a586d00c35d74d6515294e2ff2a158eb7 42a38c2bd221f478cd6d61af231d166ad80e8fca 5d1614d44a03d4e3f5cc1ede579ce805c3c3bfce 37319cd6e450285e1eb8602f2c8b70e2a86ca09a 9cc50dc777763829b4d2c246b2eeb9891f2b3534 fab8be7c3269fce897d71288abede05a8967cb59 6eb7e7a1143abf50eb73391e243bfb9adfae5a4e 5dd482398247a41688d989cf9330bc05ec324de8 220123e9e6ab0780036c2583ecac79f96977cc9d 9cef9118376e15b06d72d3187e31f6c7f4705ecf 5383c0e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:3e:10:3a:7b:a7:7b:67:21:18:d1:df:de:36:aa:c3:b5:a5:9b:6f] modulus: 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 public exponent: 10001 ] 2022-07-14 07:11:01.954  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 07:11:01.957 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 07:11:01.959 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-14 07:11:01.961 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 07:11:01.962  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-14 07:11:01.962  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 07:11:01.963  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 07:11:01.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 07:11:01.964 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 07:11:01.964 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 07:11:01.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 07:11:01.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 07:11:01.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 07:11:01.973 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 07:11:02.192  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 07:11:02.193  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 07:11:02.194 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 07:11:02.194 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 07:11:02.196  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 07:11:02.196  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 07:11:02.197 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:11:02.197 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:11:02.198 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:11:02.198 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:11:02.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:11:02.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:11:02.200 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:11:02.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:11:02.201 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:11:02.202 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 07:11:02.207 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 569746507354148421169240786320320469131142577229 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 05:18:47 UTC 2022 Final Date: Tue Jul 13 05:18:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:77:e7:64:a2:24:64:31:66:b7:96:1f:af:b2:1e:aa:21:d7:e6:30] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16950296e6426cc377dfd911b60969f31765b68a 7613d87cbc05c088c6e56a86c9e62dca9006cb2d 6ebd05f80320a1be5d44734c81e3869721e5d563 e6f3de70093c5bc8e3e171065b3baf054f793b88 d241ef1aaa22d4ba28cdd3d717698f7ac2782b56 ae0ede6efbc017d0b778ac57c5c9b127861841b2 47d8cb8f6fbc2c1f6c9e8787647e16a4cb0bbddc 0766bc0c6eb068f183e23d42f2b1815b11395eb1 a6c21214171a092ff68bf6bac97f1e8ec94e9e48 89c7dc5a586d00c35d74d6515294e2ff2a158eb7 42a38c2bd221f478cd6d61af231d166ad80e8fca 5d1614d44a03d4e3f5cc1ede579ce805c3c3bfce 37319cd6e450285e1eb8602f2c8b70e2a86ca09a 9cc50dc777763829b4d2c246b2eeb9891f2b3534 fab8be7c3269fce897d71288abede05a8967cb59 6eb7e7a1143abf50eb73391e243bfb9adfae5a4e 5dd482398247a41688d989cf9330bc05ec324de8 220123e9e6ab0780036c2583ecac79f96977cc9d 9cef9118376e15b06d72d3187e31f6c7f4705ecf 5383c0e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:57:50:46:49:92:7a:d1:2e:be:b7:33:58:2d:ee:1a:cf:88:79:16] modulus: d792b310b5138aa9a110bccbe2827417969e22510a586ed02618db707632d541e66abde7690b91cab6eba30694d174f63502f6198641257f23c001b4aa4790a7fb5a9ad1cb02df97f0fcda604ceeec1eb0dd1199966cbed7a81e2e5848727bbde154e8b6fabd1972a3371e7a6a3125e74d0085385778cccf174ce92d74478908c9dc0447eae1f80e010674e739018e12e62b94de8f2c83a1e3189b06df80adf7bca85201d09012f421a1523d9dc932bb3c03d29aa3979ca032696c0d7feedd48b985cb3cc4a91e5aa0e9c0785e32e520e1b09c64a266c413e4722aaad7b0d6428f348bf8e500d709c3083a3aa01a3b47f8e09a645e9312ca441ff3df183b1f2b public exponent: 10001 ] 2022-07-14 07:18:10.659  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 07:18:10.662 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 07:18:10.670 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-14 07:18:10.671 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 07:18:10.672  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-14 07:18:10.673  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 07:18:10.674  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 07:18:10.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 07:18:10.675 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 07:18:10.675 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 07:18:10.682 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 07:18:10.686 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 07:18:10.687 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 07:18:10.687 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 07:18:10.857  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 07:18:10.858  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 07:18:10.858 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 07:18:10.859 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 07:18:10.861  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 07:18:10.862  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 07:18:10.863 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:18:10.863 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:18:10.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:18:10.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:18:10.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:18:10.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:18:10.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:18:10.868 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:18:10.868 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:18:10.869 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 07:18:10.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 569746507354148421169240786320320469131142577229 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 05:18:47 UTC 2022 Final Date: Tue Jul 13 05:18:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:77:e7:64:a2:24:64:31:66:b7:96:1f:af:b2:1e:aa:21:d7:e6:30] modulus: bfb9861fc66111aef66601fee5405b84df6dfc3ae52db400bae528ed3f5bbc14d5539bd978ee5714e60aa718e2e39109b734813d7b71cea12d2a6908d19b3fbc085069d147a546eedd01ffeaafd343b7d622456a5c2f5fcd2bfc5de35bebb22f7599aae0ff272abdbb33bd714f5105f41e4e67f4fe450b4c0612889e86b074899e4cbdb5e9f65ac19f90074cfac48e37c1acdcfc5f38da42066b75d9b8195a91e5f3fa98f12697b118c3eb9bd03428a048c5ea1456ac780459992755f6025269fb63d936dcbc340a440affcf696625591bf97353f235af530f84b97a07ba89a1f5a83626e5b069f0068c2a728cb13df6ec0bd7a55f99ca1892fbe918429b454f485663c5288a7d9103d4206fcce2e512d1f9f7aca742b82207eeff0aa607c1d7bafc31a92473865b35c3078f20c8f6f2e83d40a9cb60c884b62a3c175bab8d7ff56eb4fb6a7bb50cd2bc7cdf8b13ce1406096862e0dcda1c9f40246412be017567968e0230f3ed25a272344a13c9513fb697fc630fb96ad3490a38b02acc4df1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16950296e6426cc377dfd911b60969f31765b68a 7613d87cbc05c088c6e56a86c9e62dca9006cb2d 6ebd05f80320a1be5d44734c81e3869721e5d563 e6f3de70093c5bc8e3e171065b3baf054f793b88 d241ef1aaa22d4ba28cdd3d717698f7ac2782b56 ae0ede6efbc017d0b778ac57c5c9b127861841b2 47d8cb8f6fbc2c1f6c9e8787647e16a4cb0bbddc 0766bc0c6eb068f183e23d42f2b1815b11395eb1 a6c21214171a092ff68bf6bac97f1e8ec94e9e48 89c7dc5a586d00c35d74d6515294e2ff2a158eb7 42a38c2bd221f478cd6d61af231d166ad80e8fca 5d1614d44a03d4e3f5cc1ede579ce805c3c3bfce 37319cd6e450285e1eb8602f2c8b70e2a86ca09a 9cc50dc777763829b4d2c246b2eeb9891f2b3534 fab8be7c3269fce897d71288abede05a8967cb59 6eb7e7a1143abf50eb73391e243bfb9adfae5a4e 5dd482398247a41688d989cf9330bc05ec324de8 220123e9e6ab0780036c2583ecac79f96977cc9d 9cef9118376e15b06d72d3187e31f6c7f4705ecf 5383c0e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:86:5a:fa:95:3b:62:5b:5e:ae:e1:50:6a:17:f5:10:19:48:f2:f4] modulus: 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 public exponent: 10001 ] 2022-07-14 07:18:29.359  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 07:18:29.360 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 07:18:29.361 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-14 07:18:29.362 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 07:18:29.362  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-14 07:18:29.363  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 07:18:29.363  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 07:18:29.363 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 07:18:29.364 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 07:18:29.364 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 07:18:29.369 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 07:18:29.370 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 07:18:29.370 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 07:18:29.370 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 07:18:29.546  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 07:18:29.547  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 07:18:29.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 07:18:29.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 07:18:29.560  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 07:18:29.560  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 07:18:29.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:18:29.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:18:29.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:18:29.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:18:29.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:18:29.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:18:29.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 07:18:29.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 07:18:29.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 07:18:29.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 07:18:29.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 569746507354148421169240786320320469131142577229 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 05:18:47 UTC 2022 Final Date: Tue Jul 13 05:18:46 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:77:e7:64:a2:24:64:31:66:b7:96:1f:af:b2:1e:aa:21:d7:e6:30] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16950296e6426cc377dfd911b60969f31765b68a 7613d87cbc05c088c6e56a86c9e62dca9006cb2d 6ebd05f80320a1be5d44734c81e3869721e5d563 e6f3de70093c5bc8e3e171065b3baf054f793b88 d241ef1aaa22d4ba28cdd3d717698f7ac2782b56 ae0ede6efbc017d0b778ac57c5c9b127861841b2 47d8cb8f6fbc2c1f6c9e8787647e16a4cb0bbddc 0766bc0c6eb068f183e23d42f2b1815b11395eb1 a6c21214171a092ff68bf6bac97f1e8ec94e9e48 89c7dc5a586d00c35d74d6515294e2ff2a158eb7 42a38c2bd221f478cd6d61af231d166ad80e8fca 5d1614d44a03d4e3f5cc1ede579ce805c3c3bfce 37319cd6e450285e1eb8602f2c8b70e2a86ca09a 9cc50dc777763829b4d2c246b2eeb9891f2b3534 fab8be7c3269fce897d71288abede05a8967cb59 6eb7e7a1143abf50eb73391e243bfb9adfae5a4e 5dd482398247a41688d989cf9330bc05ec324de8 220123e9e6ab0780036c2583ecac79f96977cc9d 9cef9118376e15b06d72d3187e31f6c7f4705ecf 5383c0e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:52:d4:57:36:90:69:86:c3:e7:40:7a:cf:a9:a8:54:e2:74:7c:b0] modulus: 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 public exponent: 10001 ]