2022-10-13 05:08:04,848 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-13 05:08:06,271 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-13 05:08:07.027  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Oct 13, 2022 5:08:09 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 13, 2022 5:08:09 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 13, 2022 5:08:09 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 13, 2022 5:08:09 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-13 05:08:09.693 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-13 05:08:10.017  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-10-13 05:08:10.198  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-13 05:08:10.971 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-13 05:08:10.973 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-10-13 05:08:10.975 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-13 05:08:10.978 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-13 05:08:11.016 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-10-13 05:08:11.019 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-10-13 05:08:11.141 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-10-13 05:08:11.736 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 13, 2022 5:08:12 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-13 05:08:12.637  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.616 seconds (JVM running for 10.335) Oct 13, 2022 5:08:35 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-13 05:09:22.197  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-13 05:09:22.203 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-13 05:09:22.240 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-13 05:09:22.243 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-13 05:09:22.259  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-13 05:09:22.261  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-13 05:09:22.262  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-13 05:09:22.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-13 05:09:22.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 05:09:22.267 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-13 05:09:22.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-13 05:09:22.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-13 05:09:22.325 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-13 05:09:22.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 05:09:22.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 05:09:22.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 05:09:22.905  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-13 05:09:22.907  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-13 05:09:22.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-13 05:09:22.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 05:09:22.919  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-13 05:09:22.920  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-13 05:09:22.920 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 05:09:22.921 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 05:09:22.921 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 05:09:22.936 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 05:09:22.936 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 05:09:22.937 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 05:09:22.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 05:09:22.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 05:09:22.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 05:09:22.945 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-13 05:09:22.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 408375587405843148947650411232957181711597975897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 13 05:05:21 UTC 2022 Final Date: Tue Oct 12 05:05:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:a5:bd:ba:f7:d5:6f:7c:1a:1b:68:43:61:a4:0c:7e:a1:42:be:a6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18a9ea28d5687df95ee527b49525941071dcdeaf fc8410d3f4ac3df5cd6b92c743a9d1914efbb9e9 69870805149aadb44e0ad3bcdb75443aad67e415 24181ab9ac339b5d60a2964bd0c3c6b1212a58dd 2b75aa31656d164c2ee78edb23ab3c3e6ba5194d 3342620b4526e1ed6f4077cfbafabda99c521137 1a684d4c1cd873e872b6d4a24b0e4f5f69f6514e d25ef6d64058f1d4a9a75fbc7cb601fb01dc53d8 c0bf3dc35d8a6f019a8ea6c863c9216702a2e5f7 d10564faadf94bbb74bc8c7e29521a2441d8c4be a78b3561131fffc23c03f561b026c189e069fe8a 3dd1de0d771317f3f0db842cb1b26f61ee875366 2de12db4ed2e4ff084c424c61205c28d505f1d76 ff5bc034a666dd20077141486d195b29c4ba78ef 59dc832cca8d4c1df2ce8ffb1450016ced89fab8 2d45754df7580051a061a7b2f8bc9985e1f9aef7 896fdd7fbba1573327cbc2492da4d5d84008dac0 de90afee224c4428b18b25c06ba17902ff7f7baf 852a91586c15b8e35a236f64870a849acba8d060 ba77b45f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:9f:53:2a:4c:2f:39:9a:f6:c9:5d:56:0d:43:b8:ed:a8:ed:d1:ab],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-13 06:17:33.737  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-13 06:17:33.740 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-13 06:17:33.743 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-13 06:17:33.744 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-13 06:17:33.744  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-13 06:17:33.745  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-13 06:17:33.746  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-13 06:17:33.746 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-13 06:17:33.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-13 06:17:33.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-13 06:17:33.754 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-13 06:17:33.755 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:17:33.755 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:17:33.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:17:33.969  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-13 06:17:33.970  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-13 06:17:33.970 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-13 06:17:33.971 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:17:33.973  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-13 06:17:33.974  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-13 06:17:33.975 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:17:33.975 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:17:33.975 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:17:33.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:17:33.977 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:17:33.977 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:17:33.978 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:17:33.978 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:17:33.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:17:33.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-13 06:17:33.984 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 408375587405843148947650411232957181711597975897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 13 05:05:21 UTC 2022 Final Date: Tue Oct 12 05:05:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:a5:bd:ba:f7:d5:6f:7c:1a:1b:68:43:61:a4:0c:7e:a1:42:be:a6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18a9ea28d5687df95ee527b49525941071dcdeaf fc8410d3f4ac3df5cd6b92c743a9d1914efbb9e9 69870805149aadb44e0ad3bcdb75443aad67e415 24181ab9ac339b5d60a2964bd0c3c6b1212a58dd 2b75aa31656d164c2ee78edb23ab3c3e6ba5194d 3342620b4526e1ed6f4077cfbafabda99c521137 1a684d4c1cd873e872b6d4a24b0e4f5f69f6514e d25ef6d64058f1d4a9a75fbc7cb601fb01dc53d8 c0bf3dc35d8a6f019a8ea6c863c9216702a2e5f7 d10564faadf94bbb74bc8c7e29521a2441d8c4be a78b3561131fffc23c03f561b026c189e069fe8a 3dd1de0d771317f3f0db842cb1b26f61ee875366 2de12db4ed2e4ff084c424c61205c28d505f1d76 ff5bc034a666dd20077141486d195b29c4ba78ef 59dc832cca8d4c1df2ce8ffb1450016ced89fab8 2d45754df7580051a061a7b2f8bc9985e1f9aef7 896fdd7fbba1573327cbc2492da4d5d84008dac0 de90afee224c4428b18b25c06ba17902ff7f7baf 852a91586c15b8e35a236f64870a849acba8d060 ba77b45f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:4b:f4:5d:cb:bb:42:98:e4:fd:10:7b:98:8e:d8:16:35:9c:14:dd],[56:66:d1:a4] modulus: cadca53e8ff26be73dc68d08ae89a39e617088bf098cf5777fe58610274e54189d7597d4164f4ab309f584fb3732e9c2467b62c32c6268273a5f27d7367cd02e458245818bd41ec5b84b0ac8b5be2df54340259c9e9b28a4786ac6c697d7c7c734d9fa2702141abcd6aeb23d3857082eed9152bd60de761bd7dd8a1768f4d35a9e423393c1b700f5e2e83d3a659ce86f50580a7efcc707b1cd76d7d742ece1354ae840291a68de6e8f3c0f8bad4dd154c1d3001d53131dadab236ecb6b32db7c91a8dd2781002f9274e473c05def4bc5610778ac86cd1022dd07e8044a0e7549a673d31ca99022b9ae54ab3dc69af7f84c7bf46f76f6cb6a5f5055a44e61ae37 public exponent: 10001 ] 2022-10-13 06:19:21.913  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-13 06:19:21.915 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-13 06:19:21.917 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-13 06:19:21.918 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-13 06:19:21.919  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-13 06:19:21.920  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-13 06:19:21.920  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-13 06:19:21.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-13 06:19:21.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-13 06:19:21.923 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-13 06:19:21.928 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-13 06:19:21.929 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:19:21.929 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:19:21.929 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:19:22.107  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-13 06:19:22.108  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-13 06:19:22.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-13 06:19:22.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:19:22.112  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-13 06:19:22.112  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-13 06:19:22.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:19:22.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:19:22.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:19:22.114 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:19:22.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:19:22.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:19:22.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:19:22.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:19:22.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:19:22.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-13 06:19:22.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 408375587405843148947650411232957181711597975897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 13 05:05:21 UTC 2022 Final Date: Tue Oct 12 05:05:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:a5:bd:ba:f7:d5:6f:7c:1a:1b:68:43:61:a4:0c:7e:a1:42:be:a6],[56:66:d1:a4] modulus: 98d44bf5daa084b1d24657e4837dc64fe8f4fbdebe811fe9919cfc2c63a4907aef8cea7f64d4357564671da4ccb1eeab13e8b0bade6f407e9e348713b0ea5ecab7d13bac10d3e980d475bf18f8703bdfeda4bcae55f5282af5339720011eef4a8737fd13bff47629461eaddb719ea4dd1c496c17f72bff3f1ea035cb85ed6b828ffd5ae181cf5b1d53bbab6813a14a76bc588c05eb0e8e883031cb8fee3c556c69e38e672174e116af9311e1bf29b4da77a05e1cd26d0866592f35ac83d3f3951807bc13ca4dab3b2528206e0989e369900477d756310eb8f7df0500ad6cd7180a091d500ed13251148e0dd26a83c0410726507ba0570b8dacce1f5328aa2befd553506b6017e3555f128486fbcf6c9eabc28ac76bc20fbe8604ec80eabd9b89e9cd211150ffbe0698d54fddc9dc8737877c83a3c97e88c362759f7acfecc406b4af49b43d4ee48b64911b2bbd9e69eb6ddeeb02de28bcf9f630966a4f378533dd7a32a9f503229a5f4098891ab069bd7065629bf67b3fab96ef8dcdef995651 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18a9ea28d5687df95ee527b49525941071dcdeaf fc8410d3f4ac3df5cd6b92c743a9d1914efbb9e9 69870805149aadb44e0ad3bcdb75443aad67e415 24181ab9ac339b5d60a2964bd0c3c6b1212a58dd 2b75aa31656d164c2ee78edb23ab3c3e6ba5194d 3342620b4526e1ed6f4077cfbafabda99c521137 1a684d4c1cd873e872b6d4a24b0e4f5f69f6514e d25ef6d64058f1d4a9a75fbc7cb601fb01dc53d8 c0bf3dc35d8a6f019a8ea6c863c9216702a2e5f7 d10564faadf94bbb74bc8c7e29521a2441d8c4be a78b3561131fffc23c03f561b026c189e069fe8a 3dd1de0d771317f3f0db842cb1b26f61ee875366 2de12db4ed2e4ff084c424c61205c28d505f1d76 ff5bc034a666dd20077141486d195b29c4ba78ef 59dc832cca8d4c1df2ce8ffb1450016ced89fab8 2d45754df7580051a061a7b2f8bc9985e1f9aef7 896fdd7fbba1573327cbc2492da4d5d84008dac0 de90afee224c4428b18b25c06ba17902ff7f7baf 852a91586c15b8e35a236f64870a849acba8d060 ba77b45f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:4a:ce:59:61:11:79:f8:26:39:4d:ac:1d:c7:e7:28:ef:43:c7:d9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-13 06:20:24.629  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-13 06:20:24.631 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-13 06:20:24.633 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-13 06:20:24.634 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-13 06:20:24.634  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-13 06:20:24.635  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-13 06:20:24.635  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-13 06:20:24.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-13 06:20:24.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-13 06:20:24.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-13 06:20:24.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-13 06:20:24.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:20:24.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:20:24.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:20:24.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-13 06:20:24.786  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-13 06:20:24.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-13 06:20:24.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:20:24.788  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-13 06:20:24.789  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-13 06:20:24.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:20:24.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:20:24.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:20:24.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:20:24.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:20:24.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:20:24.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:20:24.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:20:24.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:20:24.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-13 06:20:24.806 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 408375587405843148947650411232957181711597975897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 13 05:05:21 UTC 2022 Final Date: Tue Oct 12 05:05:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:a5:bd:ba:f7:d5:6f:7c:1a:1b:68:43:61:a4:0c:7e:a1:42:be:a6],[56:66:d1:a4] modulus: 98d44bf5daa084b1d24657e4837dc64fe8f4fbdebe811fe9919cfc2c63a4907aef8cea7f64d4357564671da4ccb1eeab13e8b0bade6f407e9e348713b0ea5ecab7d13bac10d3e980d475bf18f8703bdfeda4bcae55f5282af5339720011eef4a8737fd13bff47629461eaddb719ea4dd1c496c17f72bff3f1ea035cb85ed6b828ffd5ae181cf5b1d53bbab6813a14a76bc588c05eb0e8e883031cb8fee3c556c69e38e672174e116af9311e1bf29b4da77a05e1cd26d0866592f35ac83d3f3951807bc13ca4dab3b2528206e0989e369900477d756310eb8f7df0500ad6cd7180a091d500ed13251148e0dd26a83c0410726507ba0570b8dacce1f5328aa2befd553506b6017e3555f128486fbcf6c9eabc28ac76bc20fbe8604ec80eabd9b89e9cd211150ffbe0698d54fddc9dc8737877c83a3c97e88c362759f7acfecc406b4af49b43d4ee48b64911b2bbd9e69eb6ddeeb02de28bcf9f630966a4f378533dd7a32a9f503229a5f4098891ab069bd7065629bf67b3fab96ef8dcdef995651 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18a9ea28d5687df95ee527b49525941071dcdeaf fc8410d3f4ac3df5cd6b92c743a9d1914efbb9e9 69870805149aadb44e0ad3bcdb75443aad67e415 24181ab9ac339b5d60a2964bd0c3c6b1212a58dd 2b75aa31656d164c2ee78edb23ab3c3e6ba5194d 3342620b4526e1ed6f4077cfbafabda99c521137 1a684d4c1cd873e872b6d4a24b0e4f5f69f6514e d25ef6d64058f1d4a9a75fbc7cb601fb01dc53d8 c0bf3dc35d8a6f019a8ea6c863c9216702a2e5f7 d10564faadf94bbb74bc8c7e29521a2441d8c4be a78b3561131fffc23c03f561b026c189e069fe8a 3dd1de0d771317f3f0db842cb1b26f61ee875366 2de12db4ed2e4ff084c424c61205c28d505f1d76 ff5bc034a666dd20077141486d195b29c4ba78ef 59dc832cca8d4c1df2ce8ffb1450016ced89fab8 2d45754df7580051a061a7b2f8bc9985e1f9aef7 896fdd7fbba1573327cbc2492da4d5d84008dac0 de90afee224c4428b18b25c06ba17902ff7f7baf 852a91586c15b8e35a236f64870a849acba8d060 ba77b45f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:47:fd:f8:b3:44:61:6a:e5:82:c9:7d:32:2b:81:fe:1c:04:2c:4b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-13 06:22:35.173  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-13 06:22:35.175 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-13 06:22:35.176 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-13 06:22:35.177 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-13 06:22:35.177  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-13 06:22:35.178  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-13 06:22:35.178  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-13 06:22:35.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-13 06:22:35.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-13 06:22:35.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-13 06:22:35.183 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-13 06:22:35.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:22:35.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:22:35.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:22:35.312  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-13 06:22:35.313  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-13 06:22:35.313 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-13 06:22:35.314 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:22:35.315  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-13 06:22:35.315  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-13 06:22:35.316 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:22:35.316 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:22:35.316 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:22:35.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:22:35.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:22:35.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:22:35.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:22:35.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:22:35.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:22:35.320 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-13 06:22:35.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 408375587405843148947650411232957181711597975897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 13 05:05:21 UTC 2022 Final Date: Tue Oct 12 05:05:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:a5:bd:ba:f7:d5:6f:7c:1a:1b:68:43:61:a4:0c:7e:a1:42:be:a6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18a9ea28d5687df95ee527b49525941071dcdeaf fc8410d3f4ac3df5cd6b92c743a9d1914efbb9e9 69870805149aadb44e0ad3bcdb75443aad67e415 24181ab9ac339b5d60a2964bd0c3c6b1212a58dd 2b75aa31656d164c2ee78edb23ab3c3e6ba5194d 3342620b4526e1ed6f4077cfbafabda99c521137 1a684d4c1cd873e872b6d4a24b0e4f5f69f6514e d25ef6d64058f1d4a9a75fbc7cb601fb01dc53d8 c0bf3dc35d8a6f019a8ea6c863c9216702a2e5f7 d10564faadf94bbb74bc8c7e29521a2441d8c4be a78b3561131fffc23c03f561b026c189e069fe8a 3dd1de0d771317f3f0db842cb1b26f61ee875366 2de12db4ed2e4ff084c424c61205c28d505f1d76 ff5bc034a666dd20077141486d195b29c4ba78ef 59dc832cca8d4c1df2ce8ffb1450016ced89fab8 2d45754df7580051a061a7b2f8bc9985e1f9aef7 896fdd7fbba1573327cbc2492da4d5d84008dac0 de90afee224c4428b18b25c06ba17902ff7f7baf 852a91586c15b8e35a236f64870a849acba8d060 ba77b45f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:3e:fb:3b:a0:6b:03:7a:de:19:2f:af:f1:d6:41:8b:e5:6d:7d:8c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-13 06:28:36.887  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-13 06:28:36.890 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-13 06:28:36.892 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-13 06:28:36.892 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-13 06:28:36.893  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-13 06:28:36.894  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-13 06:28:36.894  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-13 06:28:36.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-13 06:28:36.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-13 06:28:36.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-13 06:28:36.901 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-13 06:28:36.901 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:28:36.902 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:28:36.902 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:28:37.059  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-13 06:28:37.059  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-13 06:28:37.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-13 06:28:37.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:28:37.062  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-13 06:28:37.062  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-13 06:28:37.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:28:37.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:28:37.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:28:37.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:28:37.065 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:28:37.065 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:28:37.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:28:37.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:28:37.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:28:37.067 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-13 06:28:37.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 408375587405843148947650411232957181711597975897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 13 05:05:21 UTC 2022 Final Date: Tue Oct 12 05:05:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:a5:bd:ba:f7:d5:6f:7c:1a:1b:68:43:61:a4:0c:7e:a1:42:be:a6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18a9ea28d5687df95ee527b49525941071dcdeaf fc8410d3f4ac3df5cd6b92c743a9d1914efbb9e9 69870805149aadb44e0ad3bcdb75443aad67e415 24181ab9ac339b5d60a2964bd0c3c6b1212a58dd 2b75aa31656d164c2ee78edb23ab3c3e6ba5194d 3342620b4526e1ed6f4077cfbafabda99c521137 1a684d4c1cd873e872b6d4a24b0e4f5f69f6514e d25ef6d64058f1d4a9a75fbc7cb601fb01dc53d8 c0bf3dc35d8a6f019a8ea6c863c9216702a2e5f7 d10564faadf94bbb74bc8c7e29521a2441d8c4be a78b3561131fffc23c03f561b026c189e069fe8a 3dd1de0d771317f3f0db842cb1b26f61ee875366 2de12db4ed2e4ff084c424c61205c28d505f1d76 ff5bc034a666dd20077141486d195b29c4ba78ef 59dc832cca8d4c1df2ce8ffb1450016ced89fab8 2d45754df7580051a061a7b2f8bc9985e1f9aef7 896fdd7fbba1573327cbc2492da4d5d84008dac0 de90afee224c4428b18b25c06ba17902ff7f7baf 852a91586c15b8e35a236f64870a849acba8d060 ba77b45f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:15:88:d3:76:89:01:59:79:ee:3f:31:0e:ac:12:62:f2:a8:1b:6e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-13 06:33:48.738  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-13 06:33:48.740 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-13 06:33:48.744 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-13 06:33:48.745 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-13 06:33:48.746  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-13 06:33:48.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-13 06:33:48.748  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-13 06:33:48.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-13 06:33:48.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-13 06:33:48.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-13 06:33:48.755 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-13 06:33:48.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:33:48.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:33:48.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:33:48.928  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-13 06:33:48.929  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-13 06:33:48.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-13 06:33:48.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:33:48.930  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-13 06:33:48.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-13 06:33:48.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:33:48.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:33:48.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:33:48.933 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:33:48.933 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:33:48.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:33:48.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:33:48.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:33:48.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:33:48.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-13 06:33:48.940 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 408375587405843148947650411232957181711597975897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 13 05:05:21 UTC 2022 Final Date: Tue Oct 12 05:05:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:a5:bd:ba:f7:d5:6f:7c:1a:1b:68:43:61:a4:0c:7e:a1:42:be:a6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18a9ea28d5687df95ee527b49525941071dcdeaf fc8410d3f4ac3df5cd6b92c743a9d1914efbb9e9 69870805149aadb44e0ad3bcdb75443aad67e415 24181ab9ac339b5d60a2964bd0c3c6b1212a58dd 2b75aa31656d164c2ee78edb23ab3c3e6ba5194d 3342620b4526e1ed6f4077cfbafabda99c521137 1a684d4c1cd873e872b6d4a24b0e4f5f69f6514e d25ef6d64058f1d4a9a75fbc7cb601fb01dc53d8 c0bf3dc35d8a6f019a8ea6c863c9216702a2e5f7 d10564faadf94bbb74bc8c7e29521a2441d8c4be a78b3561131fffc23c03f561b026c189e069fe8a 3dd1de0d771317f3f0db842cb1b26f61ee875366 2de12db4ed2e4ff084c424c61205c28d505f1d76 ff5bc034a666dd20077141486d195b29c4ba78ef 59dc832cca8d4c1df2ce8ffb1450016ced89fab8 2d45754df7580051a061a7b2f8bc9985e1f9aef7 896fdd7fbba1573327cbc2492da4d5d84008dac0 de90afee224c4428b18b25c06ba17902ff7f7baf 852a91586c15b8e35a236f64870a849acba8d060 ba77b45f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:f3:b2:1e:c5:eb:24:0a:0e:c2:f6:cf:19:dc:8c:75:c7:23:ce:87],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-13 06:34:13.829  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-13 06:34:13.831 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-13 06:34:13.833 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-13 06:34:13.833 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-13 06:34:13.834  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-13 06:34:13.835  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-13 06:34:13.835  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-13 06:34:13.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-13 06:34:13.836 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-13 06:34:13.836 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-13 06:34:13.840 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-13 06:34:13.840 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:34:13.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-13 06:34:13.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:34:14.024  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-13 06:34:14.025  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-13 06:34:14.025 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-13 06:34:14.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-13 06:34:14.027  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-13 06:34:14.027  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-13 06:34:14.028 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:34:14.028 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:34:14.029 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:34:14.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:34:14.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:34:14.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:34:14.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-13 06:34:14.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-13 06:34:14.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-13 06:34:14.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-13 06:34:14.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 408375587405843148947650411232957181711597975897 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Oct 13 05:05:21 UTC 2022 Final Date: Tue Oct 12 05:05:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f5:a5:bd:ba:f7:d5:6f:7c:1a:1b:68:43:61:a4:0c:7e:a1:42:be:a6],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18a9ea28d5687df95ee527b49525941071dcdeaf fc8410d3f4ac3df5cd6b92c743a9d1914efbb9e9 69870805149aadb44e0ad3bcdb75443aad67e415 24181ab9ac339b5d60a2964bd0c3c6b1212a58dd 2b75aa31656d164c2ee78edb23ab3c3e6ba5194d 3342620b4526e1ed6f4077cfbafabda99c521137 1a684d4c1cd873e872b6d4a24b0e4f5f69f6514e d25ef6d64058f1d4a9a75fbc7cb601fb01dc53d8 c0bf3dc35d8a6f019a8ea6c863c9216702a2e5f7 d10564faadf94bbb74bc8c7e29521a2441d8c4be a78b3561131fffc23c03f561b026c189e069fe8a 3dd1de0d771317f3f0db842cb1b26f61ee875366 2de12db4ed2e4ff084c424c61205c28d505f1d76 ff5bc034a666dd20077141486d195b29c4ba78ef 59dc832cca8d4c1df2ce8ffb1450016ced89fab8 2d45754df7580051a061a7b2f8bc9985e1f9aef7 896fdd7fbba1573327cbc2492da4d5d84008dac0 de90afee224c4428b18b25c06ba17902ff7f7baf 852a91586c15b8e35a236f64870a849acba8d060 ba77b45f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:94:59:40:02:82:c4:6d:24:25:32:cd:bb:2f:81:2b:5d:c1:02:5c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]