2022-03-12 02:55:34,385 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-12 02:55:36,186 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-12 02:55:37.184  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 12, 2022 2:55:39 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 12, 2022 2:55:39 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 12, 2022 2:55:39 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 12, 2022 2:55:39 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-12 02:55:40.606 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-12 02:55:40.952  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-12 02:55:41.175  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-12 02:55:42.130 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-12 02:55:42.133 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-12 02:55:42.134 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-12 02:55:42.138 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-12 02:55:42.201 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-12 02:55:42.205 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-12 02:55:42.338 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-12 02:55:43.122 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 12, 2022 2:55:44 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-12 02:55:44.449  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 11.528 seconds (JVM running for 13.894) Mar 12, 2022 2:56:01 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-12 02:56:23.706  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 02:56:23.713 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 02:56:23.763 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-12 02:56:23.772 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 02:56:23.789  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-12 02:56:23.792  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 02:56:23.793  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 02:56:23.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 02:56:23.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 02:56:23.799 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 02:56:23.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 02:56:23.808 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 02:56:23.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 02:56:23.857 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 02:56:23.857 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 02:56:23.861 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 02:56:24.544  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 02:56:24.550  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 02:56:24.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 02:56:24.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 02:56:24.563  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 02:56:24.564  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 02:56:24.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 02:56:24.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 02:56:24.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 02:56:24.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 02:56:24.578 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 02:56:24.578 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 02:56:24.584 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 02:56:24.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 02:56:24.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 02:56:24.587 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 02:56:24.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:08:47:81:bd:a8:e9:ba:9c:3e:55:ae:e6:60:66:49:6b:86:21:4c] modulus: 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 public exponent: 10001 ] 2022-03-12 03:59:39.732  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 03:59:39.736 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 03:59:39.739 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 03:59:39.741 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 03:59:39.741  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 03:59:39.743  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 03:59:39.743  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 03:59:39.744 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 03:59:39.745 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 03:59:39.745 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 03:59:39.763 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 03:59:39.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 03:59:39.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 03:59:39.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 03:59:40.065  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 03:59:40.067  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 03:59:40.067 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 03:59:40.068 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 03:59:40.072  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 03:59:40.073  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 03:59:40.074 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 03:59:40.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 03:59:40.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 03:59:40.077 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 03:59:40.078 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 03:59:40.079 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 03:59:40.080 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 03:59:40.082 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 03:59:40.083 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 03:59:40.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 03:59:40.100 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: d9ce10c46970bade901dad34db1772d2d1aba9636a9b41c8524311b514f387b3bed71daa1e697c068c0c63ebfd5d52a278a2e9e8c15e86ca7ab02fb91e2b527bb68f1d7f9f669890c68d1c86dc71e5a92f7ba02f7e31334a592714ecdf98da00a533c9b4f27b44b52a4a2a241d9c6bec0c13ba009e5663cbf7c3c864c24be7818d98f607a6e07da1df1e10ce0d3760a60d933096cdea0e6589ed9be3de415c78e6025ca3417608041103a300511ea1a703543a5f071677f7972fc956fa6841f325d7aef8eacf35fc65d764cbb1efbc599c25b16d6fd463db37571be6ec80c3e1b7e146eed2ac5a81a574c8e5a2c5ea40592bacdc5951ff2f00cdb47bc3498d2d651ae8e11023dcde41509d015b9731ede088a7cae00f28cd2fbe0f24bc840136a7825c49f1bc0387dab94bd6497dfc76d437fcc85931255c3b5c0feffc673c9049d06e28358997510040d387f52da78671a81fe66d0e7c25672e68b783cd6281aad42a80a3da98a39058b7cea6950b2018c2f38efa31f1fb4002fe2b73b357ef public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:aa:0b:b7:8b:ed:e3:e9:84:30:e8:79:46:4b:06:d6:fe:95:50:81] modulus: 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 public exponent: 10001 ] 2022-03-12 04:00:54.380  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:00:54.381 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:00:54.383 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:00:54.384 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:00:54.384  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:00:54.385  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:00:54.386  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:00:54.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:00:54.387 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:00:54.387 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:00:54.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:00:54.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:00:54.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:00:54.398 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:00:54.578  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:00:54.579  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:00:54.580 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:00:54.580 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:00:54.587  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:00:54.587  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:00:54.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:00:54.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:00:54.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:00:54.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:00:54.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:00:54.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:00:54.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:00:54.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:00:54.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:00:54.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:00:54.601 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:ee:f6:fd:50:98:8d:30:47:63:ec:32:0a:c8:a7:04:c4:ac:45:41] modulus: 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 public exponent: 10001 ] 2022-03-12 04:02:26.761  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:02:26.765 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:02:26.768 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:02:26.769 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:02:26.770  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:02:26.771  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:02:26.772  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:02:26.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:02:26.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:02:26.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:02:26.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:02:26.780 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:02:26.780 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:02:26.780 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:02:26.923  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:02:26.924  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:02:26.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:02:26.925 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:02:26.927  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:02:26.928  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:02:26.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:02:26.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:02:26.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:02:26.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:02:26.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:02:26.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:02:26.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:02:26.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:02:26.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:02:26.933 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:02:26.939 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: d9ce10c46970bade901dad34db1772d2d1aba9636a9b41c8524311b514f387b3bed71daa1e697c068c0c63ebfd5d52a278a2e9e8c15e86ca7ab02fb91e2b527bb68f1d7f9f669890c68d1c86dc71e5a92f7ba02f7e31334a592714ecdf98da00a533c9b4f27b44b52a4a2a241d9c6bec0c13ba009e5663cbf7c3c864c24be7818d98f607a6e07da1df1e10ce0d3760a60d933096cdea0e6589ed9be3de415c78e6025ca3417608041103a300511ea1a703543a5f071677f7972fc956fa6841f325d7aef8eacf35fc65d764cbb1efbc599c25b16d6fd463db37571be6ec80c3e1b7e146eed2ac5a81a574c8e5a2c5ea40592bacdc5951ff2f00cdb47bc3498d2d651ae8e11023dcde41509d015b9731ede088a7cae00f28cd2fbe0f24bc840136a7825c49f1bc0387dab94bd6497dfc76d437fcc85931255c3b5c0feffc673c9049d06e28358997510040d387f52da78671a81fe66d0e7c25672e68b783cd6281aad42a80a3da98a39058b7cea6950b2018c2f38efa31f1fb4002fe2b73b357ef public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:29:d3:97:92:02:b3:ba:e4:46:bc:2c:9a:5f:38:d3:f8:c6:5b:c6] modulus: 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 public exponent: 10001 ] 2022-03-12 04:04:10.047  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:04:10.048 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:04:10.050 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:04:10.051 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:04:10.051  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:04:10.052  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:04:10.052  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:04:10.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:04:10.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:04:10.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:04:10.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:04:10.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:04:10.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:04:10.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:10.203  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:04:10.204  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:04:10.204 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:04:10.205 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:10.207  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:04:10.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:04:10.208 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:10.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:10.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:10.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:10.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:10.211 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:10.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:10.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:10.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:10.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:04:10.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:7c:9d:78:92:76:2a:7e:a9:b1:67:67:89:68:87:f0:17:31:43:e8] modulus: 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 public exponent: 10001 ] 2022-03-12 04:04:19.725  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:04:19.726 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:04:19.727 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-12 04:04:19.728 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:04:19.728  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-12 04:04:19.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:04:19.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:04:19.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:04:19.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:04:19.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:04:19.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:04:19.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:04:19.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:04:19.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:19.943  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:04:19.944  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:04:19.944 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:04:19.944 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:19.949  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:04:19.950  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:04:19.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:19.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:19.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:19.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:19.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:19.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:19.954 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:19.955 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:19.955 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:19.956 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:04:19.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:ec:f4:1e:43:f9:5c:12:39:c1:71:4f:68:39:ab:d6:39:7f:54:d0] modulus: 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 public exponent: 10001 ] 2022-03-12 04:04:42.345  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:04:42.354 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:04:42.357 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-12 04:04:42.359 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:04:42.359  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-12 04:04:42.360  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:04:42.363  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:04:42.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:04:42.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:04:42.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:04:42.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:04:42.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:04:42.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:04:42.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:42.487  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:04:42.488  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:04:42.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:04:42.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:04:42.490  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:04:42.490  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:04:42.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:42.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:42.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:42.492 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:42.492 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:42.493 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:42.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:04:42.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:04:42.495 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:04:42.496 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:04:42.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:2e:79:8c:82:ab:22:b3:ef:fc:4b:98:70:7c:08:52:09:1c:d7:76] modulus: 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 public exponent: 10001 ] 2022-03-12 04:05:17.426  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:05:17.427 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:05:17.429 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-12 04:05:17.429 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:05:17.430  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-12 04:05:17.431  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:05:17.431  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:05:17.431 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:05:17.432 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:05:17.432 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:05:17.440 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:05:17.440 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:05:17.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:05:17.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:05:17.586  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:05:17.587  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:05:17.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:05:17.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:05:17.589  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:05:17.590  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:05:17.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:05:17.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:05:17.591 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:05:17.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:05:17.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:05:17.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:05:17.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:05:17.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:05:17.594 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:05:17.595 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:05:17.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:5a:9d:ea:2d:b0:46:c0:1a:2d:bc:57:0d:d5:39:bf:60:9f:5e:d7] modulus: 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 public exponent: 10001 ] 2022-03-12 04:07:04.070  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:07:04.071 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:07:04.074 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:07:04.075 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:07:04.075  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:07:04.076  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:07:04.076  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:07:04.077 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:07:04.077 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:07:04.078 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:07:04.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:07:04.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:07:04.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:07:04.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:07:04.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:07:04.212  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:07:04.212 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:07:04.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:07:04.214  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:07:04.214  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:07:04.215 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:07:04.215 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:07:04.215 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:07:04.216 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:07:04.216 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:07:04.217 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:07:04.217 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:07:04.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:07:04.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:07:04.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:07:04.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:a3:0e:ed:c7:39:01:b9:6b:19:d0:ba:63:f4:63:e6:bc:de:c8:17] modulus: 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 public exponent: 10001 ] 2022-03-12 04:17:59.524  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:17:59.527 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:17:59.530 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:17:59.532 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:17:59.532  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:17:59.534  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:17:59.534  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:17:59.535 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:17:59.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:17:59.537 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:17:59.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:17:59.546 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:17:59.547 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:17:59.547 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:17:59.743  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:17:59.744  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:17:59.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:17:59.745 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:17:59.746  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:17:59.747  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:17:59.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:17:59.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:17:59.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:17:59.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:17:59.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:17:59.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:17:59.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:17:59.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:17:59.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:17:59.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:17:59.755 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:46:f6:9e:b0:88:cb:77:97:b9:6a:fe:f4:79:bf:94:b7:47:da:b4] modulus: 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 public exponent: 10001 ] 2022-03-12 04:22:08.405  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:22:08.408 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:22:08.411 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:22:08.412 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:22:08.413  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-12 04:22:08.413  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:22:08.414  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:22:08.414 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:22:08.415 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:22:08.415 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:22:08.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:22:08.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:22:08.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:22:08.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:22:08.568  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:22:08.569  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:22:08.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:22:08.570 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:22:08.571  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:22:08.572  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:22:08.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:08.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:08.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:08.574 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:08.575 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:08.575 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:08.576 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:08.576 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:08.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:08.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:22:08.582 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:ac:d2:64:89:be:34:a5:b9:f1:fa:da:9a:ce:d6:e0:90:9d:d1:03] modulus: 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 public exponent: 10001 ] 2022-03-12 04:22:41.304  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:22:41.305 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:22:41.307 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-12 04:22:41.307 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:22:41.308  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-12 04:22:41.308  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:22:41.309  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:22:41.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:22:41.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:22:41.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:22:41.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:22:41.315 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:22:41.315 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:22:41.315 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:22:41.442  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:22:41.443  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:22:41.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:22:41.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:22:41.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:22:41.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:22:41.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:41.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:41.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:41.474 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:41.474 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:41.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:41.476 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:22:41.476 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:22:41.477 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:22:41.478 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:22:41.482 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:bd:60:f6:ee:a1:53:b1:ae:4d:f5:ca:da:40:0f:02:b2:55:db:4e] modulus: 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 public exponent: 10001 ] 2022-03-12 04:23:00.500  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:23:00.502 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:23:00.503 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:23:00.504 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:23:00.504  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:23:00.505  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:23:00.505  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:23:00.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:23:00.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:23:00.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:23:00.511 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:23:00.511 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:23:00.511 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:23:00.512 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:23:00.654  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:23:00.655  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:23:00.655 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:23:00.656 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:23:00.657  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:23:00.658  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:23:00.658 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:00.659 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:00.659 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:00.660 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:00.660 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:00.661 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:00.661 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:00.662 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:00.662 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:00.663 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:23:00.666 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:37:45:ba:a5:db:91:12:f8:3f:91:c3:a2:02:26:52:a5:b6:e3:12] modulus: bb30122eab4ea1f86e85765378aa0461122d3c4cf30efcb793118a23f9245904d6dc135080af54e701de3454aee0ade97a06ee90ba93dcf68d2cb8cde57a9d5b361bcd02fefe0128f5fa6ce54c5a565d253c5cbb26b514ec7093287356cf1779e8a422f68e0cfd723835da5e50a34fb53f9f9e8f33190d4b075e15360c3215c8393d8c34652f39da037b80cb557423c476239a723957308545ea397825cf85bca93b0ebe45473370cc2074f51575bde7e85dacc46459baec7d75a41ec587a9d29ad5a9fba9cc5c3d27ba016cceb67d660ef1fe862e0d067bc397b3d93120f1e5c52040fe160852f15d4efdb7fba8a4a9135656862364601aad06be37cfa014cb public exponent: 10001 ] 2022-03-12 04:23:14.635  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:23:14.636 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:23:14.637 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-12 04:23:14.638 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:23:14.639  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-12 04:23:14.640  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:23:14.640  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:23:14.640 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:23:14.640 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:23:14.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:23:14.646 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:23:14.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:23:14.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:23:14.648 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:23:14.776  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:23:14.776  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:23:14.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:23:14.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:23:14.778  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:23:14.779  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:23:14.779 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:14.780 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:14.780 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:14.780 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:14.781 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:14.781 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:14.782 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:23:14.782 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:23:14.782 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:23:14.783 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:23:14.786 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:49:f2:c1:d3:34:19:5a:be:56:af:cd:5f:2d:9f:98:53:fb:31:3f] modulus: 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 public exponent: 10001 ] 2022-03-12 04:25:02.433  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:25:02.435 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:25:02.436 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:25:02.437 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:25:02.437  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-12 04:25:02.437  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:25:02.438  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:25:02.438 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:25:02.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:25:02.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:25:02.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:25:02.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:25:02.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:25:02.445 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:25:02.568  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:25:02.569  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:25:02.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:25:02.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:25:02.571  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:25:02.572  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:25:02.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:25:02.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:25:02.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:25:02.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:25:02.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:25:02.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:25:02.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:25:02.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:25:02.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:25:02.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:25:02.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:94:84:c2:39:b8:f8:ec:1a:d2:ce:a8:9e:c0:2a:df:2c:c1:9b:2b] modulus: 9a5e7cb1feaf39086bd7b11a4b4cb99be99894381741979d05950a7037cdc136b9d7e3a4a9fd9b4051c4119fd443bd467ec76c0028753fccb1a9a5ee437b1669d387987d169ad678a79000cc6b184394d1f7f49572d05c63e147357d4a8ac935153138dd80b8d9ce5c0e80f5a4d45b717262e96b7813f5e71c519023219be95242f1dc304e39b046ef53a27b436a8b0c4941860b0452fda2df7423ba53ce30c440ac7b4eb2f5d15ca7b59a797a7746042b347ac0a94c17e80145b987117859735f824fa9cafa7b6564f49abb4ef7c80e45860a05e0ad5b25b7351d34ba1eeb0a2b93e56dc04ccd7d86c02ea8c91bc3ebd9b2ce0acb5b9d883e30e68a4a178d19 public exponent: 10001 ] 2022-03-12 04:28:52.659  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-12 04:28:52.661 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-12 04:28:52.663 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:28:52.664 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-12 04:28:52.665  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-12 04:28:52.666  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-12 04:28:52.666  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-12 04:28:52.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-12 04:28:52.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-12 04:28:52.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-12 04:28:52.686 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-12 04:28:52.688 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:28:52.688 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-12 04:28:52.689 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:28:52.862  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-12 04:28:52.863  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-12 04:28:52.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-12 04:28:52.863 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-12 04:28:52.866  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-12 04:28:52.866  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-12 04:28:52.867 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:28:52.868 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:28:52.868 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:28:52.869 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:28:52.869 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:28:52.869 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:28:52.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-12 04:28:52.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-12 04:28:52.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-12 04:28:52.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-12 04:28:52.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 695270555000245554229993854214943622334527802499 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 12 02:53:27 UTC 2022 Final Date: Thu Mar 11 02:53:26 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:e5:14:0d:06:4b:ac:ba:b9:50:1d:ca:0c:a7:0f:12:1c:31:2e:9b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6900fb20d17bf1506d72c75ba50844014277d4a8 6261ed9c5ecc240d8d7360d0fe2792f550caa1b3 71ffdc0c1721a4706adebbe0b8a58af59033a005 d99b7fd2395f406356bba1d4eeed49b80c211c9d 9e858989b097edc2bd88f395c4262ac4ba9f4eb4 4576faa3b1dc4b23a455f12395f0fd283e45e827 3e3f6750c401aa5c53566c97a05a3c5b308eb0c5 8beb043f578ecc703d776625238e8d24c0f92c0a 3a2e8e25e90ada9d7f5f139b047fd585b227df48 3e8ac19cf12db86a4a60bbc5144dab1aa47a923f 466cad9e8e8f75bcff29b75550500bd6c928b631 246fa573a59f22cbde226f56a20aa41062e778e4 affac90ac1ef7884fd482ccff25c6dea444e642a 5ddcc9a6467316d20febbafd604b02e10f5a00cf 014485499c2a6c41d68f96bedbbd9c4b792d5880 d9417ba3341edcf0402bc6ad4d5f671d56501c46 91d928d93993b010637e2a512688f6db89ed6911 d60ea22e56cc83795d5674b4d856fb5585e8df05 e6eb268e4a12d2456d7b64abab6a8b53e116b105 436a702b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:79:71:5d:7f:10:44:64:66:f5:97:15:ca:cb:74:c9:79:12:12:a8] modulus: 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 public exponent: 10001 ]