2022-03-09 11:44:49,400 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-09 11:44:50,299 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-09 11:44:51.036  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 09, 2022 11:44:53 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 09, 2022 11:44:53 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 09, 2022 11:44:53 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 09, 2022 11:44:53 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-09 11:44:53.660 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-09 11:44:53.949  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-09 11:44:54.123  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-09 11:44:54.826 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-09 11:44:54.830 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-09 11:44:54.831 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-09 11:44:54.835 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-09 11:44:54.874 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-03-09 11:44:54.877 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-03-09 11:44:55.003 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-09 11:44:55.611 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 09, 2022 11:44:56 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-09 11:44:56.556  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.998 seconds (JVM running for 9.781) Mar 09, 2022 11:45:19 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-09 11:45:42.244  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 11:45:42.255 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 11:45:42.290 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-09 11:45:42.299 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 11:45:42.314  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-09 11:45:42.317  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 11:45:42.318  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 11:45:42.319 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 11:45:42.320 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 11:45:42.324 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 11:45:42.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 11:45:42.333 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 11:45:42.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 11:45:42.378 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 11:45:42.378 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 11:45:42.381 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 11:45:43.367  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 11:45:43.370  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 11:45:43.370 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 11:45:43.372 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 11:45:43.386  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 11:45:43.387  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 11:45:43.388 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 11:45:43.388 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 11:45:43.388 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 11:45:43.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 11:45:43.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 11:45:43.401 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 11:45:43.407 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 11:45:43.407 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 11:45:43.408 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 11:45:43.409 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 11:45:43.438 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:d4:d1:92:c6:33:21:59:6d:d4:a4:14:3a:63:cc:b0:e4:85:16:e1] modulus: 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 public exponent: 10001 ] 2022-03-09 12:55:02.023  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 12:55:02.027 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 12:55:02.031 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-09 12:55:02.033 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 12:55:02.034  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-09 12:55:02.035  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 12:55:02.035  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 12:55:02.036 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 12:55:02.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 12:55:02.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 12:55:02.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 12:55:02.054 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 12:55:02.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 12:55:02.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 12:55:02.297  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 12:55:02.298  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 12:55:02.299 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 12:55:02.299 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 12:55:02.302  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 12:55:02.303  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 12:55:02.303 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:55:02.304 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:55:02.304 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:55:02.305 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:55:02.306 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:55:02.306 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:55:02.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:55:02.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:55:02.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:55:02.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 12:55:02.317 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:f2:e6:b6:48:5a:a6:27:e2:ec:29:42:d3:dd:b0:db:41:72:c6:e2] modulus: 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 public exponent: 10001 ] 2022-03-09 12:56:33.646  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 12:56:33.648 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 12:56:33.651 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 12:56:33.652 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 12:56:33.652  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 12:56:33.653  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 12:56:33.654  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 12:56:33.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 12:56:33.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 12:56:33.657 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 12:56:33.670 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 12:56:33.671 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 12:56:33.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 12:56:33.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 12:56:33.804  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 12:56:33.805  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 12:56:33.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 12:56:33.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 12:56:33.808  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 12:56:33.809  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 12:56:33.809 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:56:33.810 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:56:33.810 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:56:33.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:56:33.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:56:33.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:56:33.814 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:56:33.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:56:33.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:56:33.816 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 12:56:33.823 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:53:58:61:ac:55:8b:62:e0:9b:07:79:67:2c:58:e7:2e:b3:ed:8c] modulus: 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 public exponent: 10001 ] 2022-03-09 12:58:44.356  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 12:58:44.358 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 12:58:44.359 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-09 12:58:44.360 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 12:58:44.363  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-09 12:58:44.364  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 12:58:44.365  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 12:58:44.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 12:58:44.366 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 12:58:44.366 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 12:58:44.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 12:58:44.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 12:58:44.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 12:58:44.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 12:58:44.527  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 12:58:44.528  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 12:58:44.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 12:58:44.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 12:58:44.530  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 12:58:44.530  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 12:58:44.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:58:44.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:58:44.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:58:44.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:58:44.533 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:58:44.533 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:58:44.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:58:44.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:58:44.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:58:44.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 12:58:44.544 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: b681b327e0ea6b885928b5132fa730a00d935165e957ecd3e576bf3c1c71bfb046cc311dd084c5c19f349f43232a07a4892530b55d44e01e7284f1603a5ddbebceee45a9551deedc0bbe0c7f0fd2b7d466c8c7b371b00666b22002c62d265ae79ee8e9cd98b84ab8e0a13c271eef3cb3a2fbb9646f3d181def3c3b3595196a8ae29b9145519f32a50c1529edb732e81311533a9e7986ddf4fed9af790a967f86ede5e813526c4a0df519b32d08678277712bb53167ac8bfec831ab837bb8096a59264eb4d5c1b0032333701f78e6235b666142bcd4a0c8ae93a9c1a3f2dbeac22247aa22e5c7c5163de99e466ae1c2227fc7ccc2fe1793a8f3f3a45e3839ace279f628aab2d82dbeeb9038ce4561161c22a5a42eab403fc16ca90dd1fba6beab04d64743c1366d1a58af9d63ab676acc961e199c7a4abcab7241bd2b3ce55d12707809b532c5f5a076563b5d7308f091576029feef18bac6d8f1c62368db3b5b57f4be327c6ffd02344a586eacf3ae445c65a2e03d1ea9db2e7ce48b917400f9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:c4:8f:2b:ab:48:da:22:88:b3:02:5c:ed:16:a1:85:b5:ff:45:f3] modulus: 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 public exponent: 10001 ] 2022-03-09 12:59:32.886  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 12:59:32.887 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 12:59:32.888 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 12:59:32.888 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 12:59:32.889  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 12:59:32.889  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 12:59:32.889  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 12:59:32.890 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 12:59:32.890 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 12:59:32.891 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 12:59:32.895 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 12:59:32.896 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 12:59:32.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 12:59:32.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 12:59:33.010  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 12:59:33.011  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 12:59:33.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 12:59:33.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 12:59:33.020  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 12:59:33.021  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 12:59:33.021 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:59:33.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:59:33.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:59:33.023 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:59:33.023 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:59:33.024 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:59:33.024 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 12:59:33.025 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 12:59:33.025 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 12:59:33.026 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 12:59:33.030 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [55:27:60:e4:b8:4a:50:3c:e0:c0:69:c5:9c:dc:57:4e:f3:89:04:f9] modulus: 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 public exponent: 10001 ] 2022-03-09 13:00:09.218  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 13:00:09.219 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 13:00:09.221 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-09 13:00:09.222 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 13:00:09.222  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-09 13:00:09.224  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 13:00:09.224  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 13:00:09.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 13:00:09.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 13:00:09.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 13:00:09.231 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 13:00:09.232 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:00:09.232 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:00:09.232 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:00:09.371  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 13:00:09.372  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 13:00:09.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 13:00:09.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:00:09.374  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 13:00:09.375  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 13:00:09.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:00:09.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:00:09.376 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:00:09.376 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:00:09.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:00:09.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:00:09.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:00:09.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:00:09.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:00:09.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 13:00:09.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:d3:69:8b:6c:17:9a:6e:0c:aa:36:db:c1:4f:69:d9:2e:21:83:99] modulus: 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 public exponent: 10001 ] 2022-03-09 13:00:59.629  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 13:00:59.630 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 13:00:59.632 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-09 13:00:59.633 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 13:00:59.634  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-09 13:00:59.635  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 13:00:59.635  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 13:00:59.636 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 13:00:59.636 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 13:00:59.637 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 13:00:59.643 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 13:00:59.644 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:00:59.645 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:00:59.645 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:00:59.866  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 13:00:59.866  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 13:00:59.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 13:00:59.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:00:59.872  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 13:00:59.873  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 13:00:59.873 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:00:59.874 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:00:59.874 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:00:59.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:00:59.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:00:59.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:00:59.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:00:59.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:00:59.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:00:59.878 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 13:00:59.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:39:61:8f:14:a5:c3:c5:67:f1:b4:e8:60:f5:60:82:05:f6:52:15] modulus: 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 public exponent: 10001 ] 2022-03-09 13:02:59.504  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 13:02:59.505 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 13:02:59.506 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 13:02:59.507 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 13:02:59.507  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 13:02:59.508  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 13:02:59.508  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 13:02:59.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 13:02:59.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 13:02:59.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 13:02:59.513 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 13:02:59.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:02:59.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:02:59.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:02:59.692  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 13:02:59.692  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 13:02:59.692 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 13:02:59.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:02:59.694  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 13:02:59.694  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 13:02:59.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:02:59.695 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:02:59.695 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:02:59.696 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:02:59.696 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:02:59.696 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:02:59.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:02:59.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:02:59.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:02:59.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 13:02:59.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:c2:d1:ef:40:96:24:6e:d8:05:75:3b:41:38:81:85:98:17:16:34] modulus: 9f124eed0106a1f4df4d99a6c6db43ea1d9b0d9966ffe7cbdb0faf3d616c90c5367c4ee5c344a6516ea14235dd714abfdee853634f3fa6f55a85fb2e9fda3e6c0d18c1aa3f07a80ea70e9e0c1385397ad622ee365c7f1f406f503558a4cd0df41ef2e6e8c506b6520dfeb730c1b9f1b259f178cb2e43056830ba3c34cc7a6524a3d1d0aa998a7e5eeb89349b99744d74dc58f4ad101588bc9ff594cd784e6b4bc2fc2d7a7ada00ac061969afee38727bbe5b8825333bb1e1d0c677c2c34396abdc59e3c98e3751032b4f686f6cfafb0d7b8eed595684f59e800f729d026d9f895a38d218b81bd07592d457c1e487f4098dd9dec71fcbd6acd56ccb631182f2c1 public exponent: 10001 ] 2022-03-09 13:02:59.765  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 13:02:59.766 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 13:02:59.767 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 13:02:59.768 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 13:02:59.768  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 13:02:59.769  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 13:02:59.769  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 13:02:59.769 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 13:02:59.770 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 13:02:59.770 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 13:02:59.774 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 13:02:59.775 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:02:59.775 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:02:59.775 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:02:59.842  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 13:02:59.843  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 13:02:59.843 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 13:02:59.843 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:02:59.845  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 13:02:59.845  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 13:02:59.845 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:02:59.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:02:59.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:02:59.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:02:59.847 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:02:59.847 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:02:59.847 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:02:59.848 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:02:59.848 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:02:59.849 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 13:02:59.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:48:65:b8:e8:c8:7c:40:be:80:2c:df:03:bd:28:83:c9:d1:30:6d] modulus: c5065905a4e799e3cc6565dbb55f0fe3cb3237205226c70c183391f8b206cb20f6306c45156572f9b9d95d4e2ea149de91a4a7e122f689341d61eaa50ab5be5c4701690c3cb208c1077539246a5492c43342d9caca378cc74815285858b4c163e44f6072ce957119c94a5aad0ee70900a3f85ff02857f95b6f5ecaa9545da12aa85622788bedc5e83c369a66de66496f470403a5d0d5e8c9a1d8a066971031dcb7dcf7e932e73f55c3bd2b01b00960514d7bfb742bb65147d15b22f79acba943b060607e4d97042ccc8a869a541b60f941429171370f1b141e9098982b8b3b4b7b72d90268d2c3af0b25fb2aab7be05528c6850b0ca500b0ec9683b8d1620437 public exponent: 10001 ] 2022-03-09 13:04:28.754  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 13:04:28.756 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 13:04:28.759 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 13:04:28.759 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 13:04:28.760  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 13:04:28.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 13:04:28.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 13:04:28.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 13:04:28.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 13:04:28.763 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 13:04:28.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 13:04:28.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:04:28.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:04:28.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:04:28.915  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 13:04:28.917  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 13:04:28.918 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 13:04:28.918 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:04:28.921  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 13:04:28.922  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 13:04:28.923 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:04:28.923 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:04:28.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:04:28.925 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:04:28.926 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:04:28.926 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:04:28.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:04:28.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:04:28.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:04:28.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 13:04:28.938 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:dc:07:76:76:55:57:8f:4d:79:cd:03:33:07:e1:1a:d4:df:ef:3d] modulus: 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 public exponent: 10001 ] 2022-03-09 13:05:31.420  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 13:05:31.422 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 13:05:31.424 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 13:05:31.424 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 13:05:31.425  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 13:05:31.426  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 13:05:31.426  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 13:05:31.427 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 13:05:31.427 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 13:05:31.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 13:05:31.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 13:05:31.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:05:31.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:05:31.437 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:05:31.585  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 13:05:31.586  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 13:05:31.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 13:05:31.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:05:31.588  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 13:05:31.588  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 13:05:31.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:05:31.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:05:31.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:05:31.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:05:31.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:05:31.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:05:31.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:05:31.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:05:31.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:05:31.591 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 13:05:31.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b2:92:28:a2:ff:ac:d1:0b:86:0e:2a:13:a2:63:6b:1a:07:3d:5e:25] modulus: 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 public exponent: 10001 ] 2022-03-09 13:06:33.181  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 13:06:33.184 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 13:06:33.187 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-09 13:06:33.188 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 13:06:33.189  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-09 13:06:33.189  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 13:06:33.190  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 13:06:33.190 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 13:06:33.191 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 13:06:33.191 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 13:06:33.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 13:06:33.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:06:33.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:06:33.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:06:33.324  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 13:06:33.325  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 13:06:33.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 13:06:33.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:06:33.327  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 13:06:33.327  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 13:06:33.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:06:33.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:06:33.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:06:33.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:06:33.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:06:33.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:06:33.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:06:33.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:06:33.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:06:33.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 13:06:33.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:e1:50:ce:ce:9d:98:af:9e:95:ae:f0:0f:cd:d7:de:7d:a7:d3:b7] modulus: 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 public exponent: 10001 ] 2022-03-09 13:08:55.463  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 13:08:55.464 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 13:08:55.466 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 13:08:55.467 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 13:08:55.467  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-09 13:08:55.468  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 13:08:55.468  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 13:08:55.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 13:08:55.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 13:08:55.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 13:08:55.473 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 13:08:55.474 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:08:55.474 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:08:55.475 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:08:55.620  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 13:08:55.621  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 13:08:55.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 13:08:55.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:08:55.623  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 13:08:55.628  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 13:08:55.628 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:08:55.628 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:08:55.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:08:55.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:08:55.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:08:55.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:08:55.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:08:55.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:08:55.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:08:55.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 13:08:55.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:ae:16:c7:1b:86:84:8f:54:e9:92:e6:54:4d:87:a1:7a:a0:ac:28] modulus: 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 public exponent: 10001 ] 2022-03-09 13:10:05.065  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 13:10:05.066 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 13:10:05.067 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 13:10:05.067 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 13:10:05.068  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-09 13:10:05.068  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 13:10:05.069  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 13:10:05.069 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 13:10:05.069 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 13:10:05.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 13:10:05.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 13:10:05.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:10:05.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:10:05.075 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:10:05.167  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 13:10:05.168  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 13:10:05.168 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 13:10:05.168 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:10:05.170  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 13:10:05.170  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 13:10:05.170 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:10:05.171 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:10:05.171 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:10:05.171 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:10:05.172 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:10:05.172 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:10:05.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:10:05.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:10:05.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:10:05.174 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 13:10:05.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:0c:dd:8f:59:56:da:86:a4:b7:a0:9b:d3:37:43:de:00:d2:a8:63] modulus: ddbaf4acdb0f3e49bf0e2ae2998bee8587ed07e92dbe60032be2e3cc493368ed6a6882e7a165f88a4f7db559e9a7e5518a106e000fc11d07724c072d949715ac958e8b0837437051f806a559b7541fca12a73a1ff2e07493b07214e77bcdc27c24f22ae4d391e3afceecca39cc716282097c3e979d7c91a36244832fe91c7bc47b79cb0adba54131539dcbaa6d7be5b8529eed367a04a17fe63b98738f0101a0089839888a426617b4d89e669e0445d52a4cc95afcc1ce5b02ea0ebe76564bd44c798ac48c007e0d41fad2ddba71a7ab162a63f248fa744869f40ac5af6924aeb9903ef6788baa4b2cbd96d6fa52b6d4059460fa744a8f1f9dca56ec55d2a1db public exponent: 10001 ] 2022-03-09 13:11:39.511  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-09 13:11:39.512 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-09 13:11:39.513 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-09 13:11:39.514 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-09 13:11:39.514  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-09 13:11:39.515  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-09 13:11:39.515  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-09 13:11:39.515 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-09 13:11:39.516 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-09 13:11:39.516 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-09 13:11:39.521 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-09 13:11:39.521 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:11:39.521 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-09 13:11:39.521 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:11:39.683  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-09 13:11:39.683  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-09 13:11:39.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-09 13:11:39.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-09 13:11:39.685  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-09 13:11:39.685  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-09 13:11:39.686 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:11:39.686 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:11:39.686 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:11:39.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:11:39.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:11:39.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:11:39.688 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-09 13:11:39.688 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-09 13:11:39.689 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-09 13:11:39.689 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-09 13:11:39.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 285450773250182385216944773424378104991631017480 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 09 11:42:48 UTC 2022 Final Date: Mon Mar 08 11:42:47 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [23:f5:d6:fc:60:44:8f:6b:73:1c:85:18:3d:bf:fb:0b:83:26:3e:72] modulus: b681b327e0ea6b885928b5132fa730a00d935165e957ecd3e576bf3c1c71bfb046cc311dd084c5c19f349f43232a07a4892530b55d44e01e7284f1603a5ddbebceee45a9551deedc0bbe0c7f0fd2b7d466c8c7b371b00666b22002c62d265ae79ee8e9cd98b84ab8e0a13c271eef3cb3a2fbb9646f3d181def3c3b3595196a8ae29b9145519f32a50c1529edb732e81311533a9e7986ddf4fed9af790a967f86ede5e813526c4a0df519b32d08678277712bb53167ac8bfec831ab837bb8096a59264eb4d5c1b0032333701f78e6235b666142bcd4a0c8ae93a9c1a3f2dbeac22247aa22e5c7c5163de99e466ae1c2227fc7ccc2fe1793a8f3f3a45e3839ace279f628aab2d82dbeeb9038ce4561161c22a5a42eab403fc16ca90dd1fba6beab04d64743c1366d1a58af9d63ab676acc961e199c7a4abcab7241bd2b3ce55d12707809b532c5f5a076563b5d7308f091576029feef18bac6d8f1c62368db3b5b57f4be327c6ffd02344a586eacf3ae445c65a2e03d1ea9db2e7ce48b917400f9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 141e96a1cbf4e3a0f9693afa90d91695cbc2a5f6 36fe885cb77540936182c36a034696794962058f 426b37cd91284019f4c651809817e82c81668f57 676727ed3f81a85fb40d9d7975b5e69dacd33b9d 4d8a9e05e12c02f8a3667b18c8bdc28c05a20e17 c7fcfd5ccaf083b7ef588cf52cd7267251ca3e18 eff35121ab230bbdae67672e948383d5a301ec43 fd5a6406c2038c2d9f3b360f9a2b3dea9c506f14 ca8c0ceedba1cf2d11ca09ef97f441d61e015a5c e4b7ff5630a186d1703f4562514c69bf0f146b68 2894f6709967a34e7cd246edf516d5bb58b5b51c f66f25ce7199014e9dfea0470f744ba0b277651c ebb670c3d2c3867dafc58cf02b810c063869d5d7 7aac7340fa800a94438037b080beaf9a3f32e936 2b3091274f2d3c695cb7ec9f07938dc6a6f0fc54 975c4d07134d0ee33ad62d91e67130921051e444 47680323ada6f83bc317301e0a9596e717cb666f 37021b38f6f1bb529de33e3232d8e1739084e1e1 5ffef4ec0af27917cd26e06867d84c3088979677 73444481 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:2e:9d:0b:b4:c4:52:59:90:7c:9e:49:ba:42:ed:09:86:8d:45:0f] modulus: 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 public exponent: 10001 ]