2022-03-07 03:07:09,989 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-07 03:07:11,982 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-07 03:07:13.000  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 07, 2022 3:07:15 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 07, 2022 3:07:15 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 07, 2022 3:07:15 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 07, 2022 3:07:16 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-07 03:07:16.787 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-07 03:07:17.160  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-07 03:07:17.394  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-07 03:07:18.385 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-07 03:07:18.388 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-07 03:07:18.389 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-07 03:07:18.393 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-07 03:07:18.437 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-03-07 03:07:18.441 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-03-07 03:07:18.591 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-07 03:07:19.458 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 07, 2022 3:07:20 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-07 03:07:20.759  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 11.897 seconds (JVM running for 14.388) Mar 07, 2022 3:07:45 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-07 03:08:10.661  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 03:08:10.672 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 03:08:10.730 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-07 03:08:10.736 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 03:08:10.761  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-07 03:08:10.764  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 03:08:10.765  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 03:08:10.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 03:08:10.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 03:08:10.773 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 03:08:10.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 03:08:10.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 03:08:10.850 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 03:08:10.857 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 03:08:10.858 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 03:08:10.862 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 03:08:11.838  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 03:08:11.842  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 03:08:11.843 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 03:08:11.845 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 03:08:11.861  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 03:08:11.863  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 03:08:11.864 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 03:08:11.865 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 03:08:11.865 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 03:08:11.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 03:08:11.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 03:08:11.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 03:08:11.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 03:08:11.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 03:08:11.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 03:08:11.891 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 03:08:11.933 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:ef:5a:33:e8:cf:47:7b:5e:48:98:59:19:27:ee:ca:31:7b:a7:3f] modulus: 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 public exponent: 10001 ] 2022-03-07 04:15:36.368  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:15:36.372 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:15:36.376 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-07 04:15:36.378 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:15:36.379  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-07 04:15:36.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:15:36.381  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:15:36.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:15:36.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:15:36.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:15:36.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:15:36.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:15:36.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:15:36.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:15:36.713  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:15:36.714  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:15:36.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:15:36.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:15:36.719  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:15:36.720  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:15:36.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:15:36.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:15:36.723 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:15:36.725 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:15:36.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:15:36.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:15:36.728 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:15:36.729 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:15:36.729 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:15:36.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:15:36.735 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:fc:84:92:d6:6d:44:9f:ff:07:60:60:ff:0a:7b:e7:1b:83:c6:fb] modulus: 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 public exponent: 10001 ] 2022-03-07 04:16:50.920  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:16:50.924 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:16:50.934 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-07 04:16:50.936 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:16:50.937  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-07 04:16:50.939  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:16:50.940  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:16:50.941 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:16:50.942 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:16:50.943 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:16:50.957 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:16:50.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:16:50.960 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:16:50.961 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:16:51.213  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:16:51.215  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:16:51.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:16:51.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:16:51.222  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:16:51.223  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:16:51.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:16:51.225 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:16:51.225 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:16:51.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:16:51.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:16:51.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:16:51.230 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:16:51.230 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:16:51.231 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:16:51.234 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:16:51.242 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:2f:e6:34:af:d8:66:e6:e3:b0:a7:13:7b:6d:c6:7b:40:44:a9:7a] modulus: c97779c4f18b333680ddf60030f0b352ee0961b71bb95db6ff19d9d1d0c17f2e946bc8edf69d93216df116e8d654f4dd53f4103ecdc117c7dca77a1f7bca9fbb4b707480d192e2e0413f98b5e97dcb26aa2ce022980f712e288acb9cd2e782ad325e39c693ffab9300c7b4ca789a3230a2951cd5ec0e42e5a4eeeaf374c348307ee14b40a8b6b393a2a89eec130007874f654209c7e67e31a0959ba8454089d4603b86deb4f35fbe5b6d17afc1446694766cbaf8c42969867765aba40e0ae1330320b1826f2af5c27fe74ef2416f293ca28f4136179126666bc375fb9bea985a626e4df03cc5036ce3290daa074b4988045489a889cca76dc5c83d288436cf65 public exponent: 10001 ] 2022-03-07 04:19:21.588  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:19:21.590 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:19:21.592 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-07 04:19:21.593 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:19:21.593  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-07 04:19:21.594  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:19:21.594  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:19:21.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:19:21.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:19:21.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:19:21.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:19:21.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:19:21.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:19:21.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:19:21.802  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:19:21.803  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:19:21.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:19:21.804 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:19:21.806  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:19:21.807  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:19:21.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:19:21.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:19:21.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:19:21.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:19:21.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:19:21.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:19:21.811 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:19:21.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:19:21.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:19:21.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:19:21.820 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:1b:a7:8c:7d:b6:e7:a4:0a:79:42:9d:a1:b9:92:66:c5:c2:6f:ef] modulus: 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 public exponent: 10001 ] 2022-03-07 04:21:24.542  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:21:24.543 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:21:24.546 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-07 04:21:24.548 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:21:24.549  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-07 04:21:24.550  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:21:24.550  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:21:24.551 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:21:24.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:21:24.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:21:24.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:21:24.561 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:21:24.561 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:21:24.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:21:24.752  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:21:24.753  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:21:24.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:21:24.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:21:24.757  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:21:24.760  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:21:24.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:21:24.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:21:24.763 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:21:24.764 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:21:24.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:21:24.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:21:24.767 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:21:24.767 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:21:24.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:21:24.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:21:24.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c4:28:53:d3:32:2c:2e:0e:00:8b:fe:35:35:d5:4a:54:be:35:a0:46] modulus: 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 public exponent: 10001 ] 2022-03-07 04:23:10.799  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:23:10.805 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:23:10.816 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-07 04:23:10.818 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:23:10.819  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-07 04:23:10.820  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:23:10.821  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:23:10.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:23:10.822 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:23:10.823 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:23:10.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:23:10.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:23:10.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:23:10.836 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:23:11.029  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:23:11.030  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:23:11.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:23:11.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:23:11.033  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:23:11.033  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:23:11.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:23:11.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:23:11.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:23:11.036 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:23:11.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:23:11.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:23:11.038 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:23:11.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:23:11.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:23:11.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:23:11.047 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:0a:78:cc:07:50:dd:a0:85:f8:8a:41:c4:62:4b:da:82:ba:4f:c5] modulus: eec11ca915f5d8c243cfcbac83a972a23cb2b0c23d3aca81b98da65e3393fd1d93985a374269103c3b5bc8b42f470c88dd7cf8c31556ff3bf9d5169c9de1de72aa4afb59292a5a94fd79090240a722b85b0091f6429852ab0b1455ee81bc806a8ad77f982cfaa0b403a4e4297038a9b5d592f4daa072d170d1771d45f6dcd56961c548c4f19414d66110faab4a5620247b8fdf207847c8d17368b5c341bab2470f77eb32be562f258046da4d3aebc8759cdb9fc20e51574183456ee3bfd30eeb65435b275782ad266e354556102730f0cd2b95fafbf4f3ff2cc196a8cb74f115e742b3e8fc95a54fc13d6e234e2ed3625fdaa2f9366f5ed7902b18d23f4b2067 public exponent: 10001 ] 2022-03-07 04:24:52.751  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:24:52.753 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:24:52.755 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-07 04:24:52.756 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:24:52.757  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-07 04:24:52.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:24:52.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:24:52.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:24:52.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:24:52.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:24:52.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:24:52.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:24:52.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:24:52.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:24:52.994  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:24:52.995  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:24:52.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:24:52.997 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:24:52.999  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:24:53.000  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:24:53.000 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:24:53.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:24:53.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:24:53.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:24:53.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:24:53.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:24:53.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:24:53.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:24:53.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:24:53.009 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:24:53.013 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:85:49:3d:43:44:fd:14:9c:43:ad:42:5f:85:a4:ed:5f:bc:d6:e0] modulus: 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 public exponent: 10001 ] 2022-03-07 04:26:39.281  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:26:39.283 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:26:39.285 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-07 04:26:39.285 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:26:39.286  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-07 04:26:39.287  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:26:39.287  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:26:39.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:26:39.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:26:39.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:26:39.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:26:39.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:26:39.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:26:39.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:26:39.476  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:26:39.476  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:26:39.477 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:26:39.477 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:26:39.479  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:26:39.479  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:26:39.479 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:26:39.480 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:26:39.480 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:26:39.482 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:26:39.482 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:26:39.482 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:26:39.483 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:26:39.484 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:26:39.484 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:26:39.485 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:26:39.490 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: aac1f3b272c71466911aea9dcd0195a7083c1b7fa59fd7cfef076b23df6e5ea05388e618c208e79d9c8136d634f81e03080372605f3bbc4a08d96c6a12dce4c23ef7870be682550cf5f2c59a371404bb12b9233ccd9a64f8e525686b659e4d41cedc122be7064a7502eec1abd2f476a2771bab25b7ed99dbfaff2a5dc0b9f6e61f02828dd8fa5624f4a2073299b73a36b6ff73c0356339a8f386f758c650de3900d946fc0ee2dd41e0d9e8edf216030e1fd792c19b195ebbcd5ed5afeb3230107ca4e397cb1c3b9c7df5fcab4c9b2546a3b4c20c6dc89a8c8206d3c46cc372504ce2313e5b08d30dff6d18ba8080bbd67d46404d75ca8c49f626d1aac4223689ae28bcebbeafab8b5e31b1a3f57c935f26471994cf149f85d347254bcf931e138486859fefb89ba52f39b4d4c9155fed6481214e9d1a0d81b96bf8171b6c018484c184b4b976bcf763a56fb8f1517efc0427c9611a03a2c32fe4c80c0fa6aeae167ee810ddb4828e0dd84fa83431b62e6d2cf71fe10c2f2b7bc3f3a6a9358e5d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:85:c1:17:44:2b:bb:7b:e4:b0:15:8a:b6:cc:b3:ad:c5:5e:36:b2] modulus: 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 public exponent: 10001 ] 2022-03-07 04:27:00.201  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:27:00.208 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:27:00.212 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-07 04:27:00.217 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:27:00.218  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-07 04:27:00.219  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:27:00.220  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:27:00.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:27:00.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:27:00.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:27:00.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:27:00.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:27:00.267 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:27:00.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:27:00.441  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:27:00.441  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:27:00.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:27:00.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:27:00.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:27:00.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:27:00.446 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:27:00.446 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:27:00.447 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:27:00.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:27:00.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:27:00.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:27:00.449 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:27:00.450 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:27:00.451 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:27:00.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:27:00.455 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [88:4d:ac:db:f9:c4:e0:7c:1a:8e:ad:76:5b:13:4a:28:0a:1b:50:d3] modulus: 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 public exponent: 10001 ] 2022-03-07 04:29:42.647  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:29:42.649 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:29:42.652 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-07 04:29:42.653 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:29:42.654  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-07 04:29:42.654  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:29:42.655  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:29:42.655 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:29:42.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:29:42.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:29:42.665 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:29:42.666 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:29:42.666 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:29:42.666 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:29:42.891  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:29:42.892  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:29:42.892 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:29:42.893 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:29:42.894  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:29:42.894  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:29:42.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:29:42.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:29:42.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:29:42.896 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:29:42.896 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:29:42.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:29:42.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:29:42.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:29:42.898 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:29:42.899 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:29:42.904 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: aac1f3b272c71466911aea9dcd0195a7083c1b7fa59fd7cfef076b23df6e5ea05388e618c208e79d9c8136d634f81e03080372605f3bbc4a08d96c6a12dce4c23ef7870be682550cf5f2c59a371404bb12b9233ccd9a64f8e525686b659e4d41cedc122be7064a7502eec1abd2f476a2771bab25b7ed99dbfaff2a5dc0b9f6e61f02828dd8fa5624f4a2073299b73a36b6ff73c0356339a8f386f758c650de3900d946fc0ee2dd41e0d9e8edf216030e1fd792c19b195ebbcd5ed5afeb3230107ca4e397cb1c3b9c7df5fcab4c9b2546a3b4c20c6dc89a8c8206d3c46cc372504ce2313e5b08d30dff6d18ba8080bbd67d46404d75ca8c49f626d1aac4223689ae28bcebbeafab8b5e31b1a3f57c935f26471994cf149f85d347254bcf931e138486859fefb89ba52f39b4d4c9155fed6481214e9d1a0d81b96bf8171b6c018484c184b4b976bcf763a56fb8f1517efc0427c9611a03a2c32fe4c80c0fa6aeae167ee810ddb4828e0dd84fa83431b62e6d2cf71fe10c2f2b7bc3f3a6a9358e5d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:71:47:7c:8f:7f:33:41:23:52:2e:22:d2:bd:0a:f0:62:3e:f8:26] modulus: eb66e085bb9ae0236e9aa4cd30d737106c307adfb3a28a04301499079c2c7fe48122f2a77d0592b50c5890a5e06d1d1140007f836a507e5689ef50710814d7679178ae649351dbd49647e3fee1380554b28ad2d4f4b5c1a2cb0ba511b0c0d726b6793a51b16c4db1bcde32cc41c4b4842e123daa9736f7a92f19fa64a83dd3c8b3e533aac8d5d7c523aceffd04b64354d700caa918a5ca33a51f2b3eeb6ac4847722d28a9cb0489aa8ce60ade1da9929d440dc7e6b1cde6a6a7d0237bc0120f793e26de7ba8b3e94a698b1a321713931aaa05a4f0ddb0d7656949fc6eb99cca03746a01b22628765eff6f1c1e707766ad9800237da7781b5e9b7efab84fe2f5d public exponent: 10001 ] 2022-03-07 04:31:01.890  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:31:01.895 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:31:01.899 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-07 04:31:01.903 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:31:01.904  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-07 04:31:01.906  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:31:01.907  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:31:01.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:31:01.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:31:01.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:31:01.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:31:01.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:31:01.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:31:01.921 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:31:02.098  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:31:02.099  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:31:02.099 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:31:02.099 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:31:02.102  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:31:02.102  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:31:02.103 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:31:02.103 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:31:02.104 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:31:02.105 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:31:02.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:31:02.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:31:02.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:31:02.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:31:02.108 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:31:02.109 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:31:02.119 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:89:24:74:5f:43:89:d1:db:8e:ea:5c:16:76:69:87:a2:08:3b:3f] modulus: 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 public exponent: 10001 ] 2022-03-07 04:31:46.575  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:31:46.577 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:31:46.581 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-07 04:31:46.584 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:31:46.584  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-07 04:31:46.586  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:31:46.587  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:31:46.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:31:46.588 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:31:46.588 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:31:46.594 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:31:46.595 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:31:46.595 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:31:46.596 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:31:46.799  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:31:46.799  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:31:46.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:31:46.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:31:46.802  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:31:46.802  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:31:46.803 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:31:46.804 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:31:46.804 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:31:46.805 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:31:46.805 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:31:46.806 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:31:46.807 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:31:46.807 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:31:46.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:31:46.809 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:31:46.814 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:cf:fb:dc:ad:e8:10:fd:74:ec:b0:ad:b1:0a:56:87:77:f1:87:5e] modulus: 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 public exponent: 10001 ] 2022-03-07 04:32:35.792  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:32:35.793 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:32:35.795 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-07 04:32:35.796 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:32:35.797  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-07 04:32:35.798  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:32:35.798  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:32:35.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:32:35.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:32:35.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:32:35.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:32:35.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:32:35.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:32:35.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:32:35.997  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:32:35.998  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:32:35.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:32:35.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:32:36.001  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:32:36.004  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:32:36.005 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:32:36.006 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:32:36.006 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:32:36.007 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:32:36.008 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:32:36.008 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:32:36.009 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:32:36.009 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:32:36.010 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:32:36.011 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:32:36.021 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:cc:ef:04:f0:98:4d:ba:be:3b:bf:a2:b5:ed:ea:ae:64:19:9e:73] modulus: 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 public exponent: 10001 ] 2022-03-07 04:36:25.934  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:36:25.937 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:36:25.940 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-07 04:36:25.947 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:36:25.948  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-07 04:36:25.951  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:36:25.951  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:36:25.952 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:36:25.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:36:25.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:36:25.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:36:25.963 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:36:25.963 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:36:25.964 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:36:26.185  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:36:26.186  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:36:26.187 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:36:26.187 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:36:26.190  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:36:26.191  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:36:26.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:36:26.192 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:36:26.192 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:36:26.193 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:36:26.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:36:26.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:36:26.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:36:26.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:36:26.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:36:26.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:36:26.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:2a:52:f3:82:48:14:d4:c5:ba:e8:57:a1:c8:b1:6a:31:3d:f5:8b] modulus: c8628eb1c0c10395a2f702fd2cf37894a6ab537cea07cc4b9c093723dbc22090595acc942e69364cdc4e01a4c51b4068ffa7a18207ecd142f86003646932c9dd5426b5917be5f5d0e69556300b8a502d2b5f61b90f273ff55799ab07ce36097c01355590fd94ac54a368612dede0223b9f38fb85096bec722d44801910533795756dc1ba18e81c28b90ae2a7e626ad98748e0ba824b019bcde8266d6fb4cba83419e5e2f13a0b8473a5b7933f72f26a456015429cb0275fde0268d93362d2b597486435f33f2a4576f8339e8715322582c5b78c57597c6dfc07473f6a6283b79b769a6c64cc002f6e9b752df25490b10a6e2f4c508a84c208427fbc08bd7bd1f public exponent: 10001 ] 2022-03-07 04:36:56.477  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:36:56.478 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:36:56.480 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-07 04:36:56.481 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:36:56.482  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-07 04:36:56.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:36:56.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:36:56.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:36:56.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:36:56.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:36:56.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:36:56.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:36:56.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:36:56.494 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:36:56.720  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:36:56.721  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:36:56.721 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:36:56.722 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:36:56.724  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:36:56.724  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:36:56.725 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:36:56.725 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:36:56.725 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:36:56.726 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:36:56.727 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:36:56.728 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:36:56.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:36:56.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:36:56.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:36:56.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:36:56.734 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:20:5a:69:12:c0:dc:ef:53:5a:8a:ff:0e:a0:32:ee:2e:55:92:c8] modulus: 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 public exponent: 10001 ] 2022-03-07 04:37:30.857  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:37:30.858 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:37:30.859 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-07 04:37:30.860 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:37:30.860  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-07 04:37:30.860  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:37:30.861  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:37:30.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:37:30.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:37:30.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:37:30.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:37:30.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:37:30.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:37:30.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:37:31.141  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:37:31.142  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:37:31.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:37:31.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:37:31.145  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:37:31.145  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:37:31.146 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:37:31.146 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:37:31.147 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:37:31.147 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:37:31.148 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:37:31.148 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:37:31.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:37:31.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:37:31.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:37:31.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:37:31.155 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:b9:ed:6a:1f:4d:b9:81:9e:c4:e5:13:a6:50:6d:99:68:e2:24:6e] modulus: add4b43ac39d740d1af2d8b25092438f94c9d2457bbb86edc877f305ddb284f8a6006e4e5d06bff4b6df861820cfef8eb63f6edbbe2381ebaf875042fc22a5d114c719b7d7c95ac910dfd784b23cfa2073949f4dcd8832672dcba4cf62bfaa76d0c685cda1fabdc0088f20e5c7bcc8470d05f09275c2f9c9b0477f353bbd3f884489e0bb82c627420bf516d4da38d939d8258612a46bdea2102a7c5c203831af32cd11d750d37039d2f3e74494b0ef02fc9ead0440568bd164eb12cc086ea6eee101767a4a9a373e263ea7a2f008232d9d8ac5b24875f67a0cf1edc46c223685ac16ed10f5ac7753fecc14c1d6d18effdc2afe05fff78bcd54c67d608b7c13d5 public exponent: 10001 ] 2022-03-07 04:39:26.335  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-07 04:39:26.339 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-07 04:39:26.344 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-07 04:39:26.346 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-07 04:39:26.347  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-07 04:39:26.348  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-07 04:39:26.354  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-07 04:39:26.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-07 04:39:26.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-07 04:39:26.358 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-07 04:39:26.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-07 04:39:26.365 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:39:26.366 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-07 04:39:26.366 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:39:26.543  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-07 04:39:26.544  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-07 04:39:26.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-07 04:39:26.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-07 04:39:26.547  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-07 04:39:26.547  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-07 04:39:26.547 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:39:26.548 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:39:26.548 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:39:26.549 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:39:26.549 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:39:26.549 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:39:26.550 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-07 04:39:26.550 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-07 04:39:26.550 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-07 04:39:26.552 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-07 04:39:26.557 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 14735117053457578393378462250978128998491902700 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 07 03:03:59 UTC 2022 Final Date: Sat Mar 06 03:03:58 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [0a:9b:37:fa:a3:12:db:78:1b:af:93:46:a9:5b:8a:ee:e8:49:55:36] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 07e851c10e905bb7787a2c1c6dbc7301f250e972 d66ae0b1b2f7f19fbfbe7ddd559fc5d5ae074001 35b9d6fc75b0b5dffc6f56bec701037e9f46a99a 85781f00348869dbe9638d5f42d742737a877010 99e2fc388575a923b9a117db4f19793756de054f 7c8d8479b145615573f8bbec18d510f91465d860 83aef9b19ef1631af4bc73d3afc9eee60a3e3ab2 488fcc1470e146e32e105b293b6a00db117e298a 8f66a6dfd044499f6caeb8dec66aed0f61d86815 8d19a4d2820ba328a8614d2b68ff6eea0bb7848b 3f884b2b6cd987a487569d36f54e2c0f7d5a2b2e 22ec9ee8cb86cb85816caad1c177c73dbf511680 fae84b0a14fdba792aff4d4786863c3c7d5536fc 931826b2f5d498d8a46391fccbfe67658a747b9b 03e7de259b943da9eba8030e96fdcaab16268566 8bc389d4a70facc19a11392c06eb14f5315e43c8 52a643d807924423e739088f2efa53f26569bb51 fe14eb68bc9cd874be7479cd763927f2b6102352 a36de4d14ef8cedd4fc66b69e53cbb8466b891f7 40879caa Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2d:9f:c6:5c:73:30:12:7d:23:f3:a5:c8:3f:c9:e0:aa:5a:ca:00:25] modulus: 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 public exponent: 10001 ]