2022-03-13 03:02:10,011 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-13 03:02:11,091 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-13 03:02:11.910  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 13, 2022 3:02:14 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 13, 2022 3:02:14 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 13, 2022 3:02:14 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 13, 2022 3:02:14 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-13 03:02:14.910 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-13 03:02:15.289  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-13 03:02:15.474  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-13 03:02:16.259 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-13 03:02:16.262 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-13 03:02:16.264 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-13 03:02:16.268 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-13 03:02:16.314 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-13 03:02:16.320 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-13 03:02:16.458 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-13 03:02:17.177 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 13, 2022 3:02:18 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-13 03:02:18.354  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.266 seconds (JVM running for 11.39) Mar 13, 2022 3:02:45 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-13 03:02:58.828  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 03:02:58.839 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 03:02:58.892 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-13 03:02:58.901 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 03:02:58.928  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-13 03:02:58.931  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 03:02:58.932  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 03:02:58.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 03:02:58.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 03:02:58.938 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 03:02:58.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 03:02:58.947 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 03:02:58.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 03:02:58.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 03:02:58.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 03:02:59.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 03:02:59.760  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 03:02:59.764  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 03:02:59.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 03:02:59.767 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 03:02:59.780  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 03:02:59.781  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 03:02:59.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 03:02:59.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 03:02:59.783 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 03:02:59.795 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 03:02:59.796 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 03:02:59.796 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 03:02:59.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 03:02:59.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 03:02:59.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 03:02:59.805 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 03:02:59.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:3a:83:b1:de:39:4f:71:52:c1:99:2e:63:73:be:c4:65:53:c7:7c] modulus: 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 public exponent: 10001 ] 2022-03-13 04:05:27.060  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:05:27.063 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:05:27.066 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-13 04:05:27.068 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:05:27.068  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-13 04:05:27.069  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:05:27.069  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:05:27.070 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:05:27.071 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:05:27.071 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:05:27.079 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:05:27.080 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:05:27.081 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:05:27.081 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:05:27.336  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:05:27.337  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:05:27.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:05:27.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:05:27.342  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:05:27.343  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:05:27.344 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:05:27.345 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:05:27.346 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:05:27.348 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:05:27.349 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:05:27.350 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:05:27.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:05:27.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:05:27.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:05:27.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:05:27.361 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: bfb59aa5949569e4a58d3bb0c1c89870460ecf84394c3bceffac21063fa9430003034c0dfc18251a77a7ae28ca36cf7303df02d71e8e5974f584d659e6f711b0e9990e27ddcc538576bf9282520ccbf52731405e0a850352ce5e0438efae8303334cf26bbd099a8e525e9eef675d66cab7cd37bd0d7f0323de8e64d1100f7552914d2a6aaf44cd95bda9d72a1194e69fec6ff569b9773efede6c0edaa0a0a237a452cd4a35d63a7273e1b8645aeb995bdcefb19e9af5b6003bbb9c7fbc88110897d6f673edcccfe6ef3a8c83d386db54857cc5a89048ceced86267fd73c89335b6b55753c4ed4d8611d1891065ff32fa7d62700849e36a98dcb4a8531070b3025071f4165dd75706ac29c8f159c2c9cc45c81c698e74335e94b8964350f442d210e1b29ae4aa86da1db50e098c42a641dffdc8bcafeab28eec4498e0a3c20e066fa94249ff0752bc44d35a907d5272c5354bf1d1d120565615bdbca7b7707a2d775c7e061c61680c614ff2b7bd5f87fa3424660369f5ae0fb58a6b3c5bfd6de9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:1a:80:47:88:03:69:a1:1e:e9:f6:71:70:0d:ae:20:e3:c1:f0:fc] modulus: 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 public exponent: 10001 ] 2022-03-13 04:06:19.038  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:06:19.040 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:06:19.042 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-13 04:06:19.043 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:06:19.044  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-13 04:06:19.045  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:06:19.045  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:06:19.046 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:06:19.046 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:06:19.047 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:06:19.058 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:06:19.059 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:06:19.060 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:06:19.061 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:06:19.330  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:06:19.331  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:06:19.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:06:19.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:06:19.334  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:06:19.334  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:06:19.335 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:06:19.335 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:06:19.336 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:06:19.337 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:06:19.337 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:06:19.337 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:06:19.338 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:06:19.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:06:19.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:06:19.340 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:06:19.345 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:0b:8e:98:b5:b7:52:93:1d:d0:ae:a2:8d:34:2f:7c:7f:68:01:09] modulus: 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 public exponent: 10001 ] 2022-03-13 04:07:52.843  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:07:52.845 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:07:52.848 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-13 04:07:52.849 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:07:52.850  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-13 04:07:52.851  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:07:52.851  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:07:52.851 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:07:52.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:07:52.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:07:52.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:07:52.868 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:07:52.869 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:07:52.870 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:07:53.172  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:07:53.174  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:07:53.174 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:07:53.174 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:07:53.177  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:07:53.177  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:07:53.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:07:53.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:07:53.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:07:53.180 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:07:53.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:07:53.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:07:53.182 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:07:53.183 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:07:53.183 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:07:53.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:07:53.190 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:29:c2:b0:1c:04:27:96:0e:b0:6f:cd:c3:a6:93:bf:a5:4f:af:31] modulus: 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 public exponent: 10001 ] 2022-03-13 04:09:45.166  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:09:45.167 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:09:45.169 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-13 04:09:45.170 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:09:45.170  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-13 04:09:45.172  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:09:45.173  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:09:45.173 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:09:45.174 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:09:45.174 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:09:45.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:09:45.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:09:45.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:09:45.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:09:45.366  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:09:45.367  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:09:45.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:09:45.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:09:45.370  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:09:45.371  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:09:45.372 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:09:45.373 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:09:45.373 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:09:45.374 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:09:45.375 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:09:45.375 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:09:45.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:09:45.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:09:45.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:09:45.379 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:09:45.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:82:0b:fe:02:09:9d:18:d6:e3:90:ed:00:1b:0b:de:d9:6a:f7:a8] modulus: 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 public exponent: 10001 ] 2022-03-13 04:09:58.949  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:09:58.950 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:09:58.952 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-13 04:09:58.952 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:09:58.953  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-13 04:09:58.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:09:58.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:09:58.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:09:58.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:09:58.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:09:58.964 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:09:58.964 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:09:58.965 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:09:58.965 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:09:59.177  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:09:59.178  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:09:59.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:09:59.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:09:59.180  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:09:59.181  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:09:59.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:09:59.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:09:59.182 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:09:59.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:09:59.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:09:59.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:09:59.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:09:59.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:09:59.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:09:59.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:09:59.190 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:46:89:70:88:59:aa:c3:c6:4a:b2:ef:3d:d0:f6:9f:e5:6d:a9:ff] modulus: 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 public exponent: 10001 ] 2022-03-13 04:10:32.201  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:10:32.203 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:10:32.205 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-13 04:10:32.206 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:10:32.206  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-13 04:10:32.207  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:10:32.207  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:10:32.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:10:32.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:10:32.209 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:10:32.215 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:10:32.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:10:32.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:10:32.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:10:33.699  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:10:33.700  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:10:33.701 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:10:33.701 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:10:33.703  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:10:33.703  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:10:33.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:10:33.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:10:33.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:10:33.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:10:33.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:10:33.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:10:33.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:10:33.708 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:10:33.709 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:10:33.710 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:10:33.714 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: bfb59aa5949569e4a58d3bb0c1c89870460ecf84394c3bceffac21063fa9430003034c0dfc18251a77a7ae28ca36cf7303df02d71e8e5974f584d659e6f711b0e9990e27ddcc538576bf9282520ccbf52731405e0a850352ce5e0438efae8303334cf26bbd099a8e525e9eef675d66cab7cd37bd0d7f0323de8e64d1100f7552914d2a6aaf44cd95bda9d72a1194e69fec6ff569b9773efede6c0edaa0a0a237a452cd4a35d63a7273e1b8645aeb995bdcefb19e9af5b6003bbb9c7fbc88110897d6f673edcccfe6ef3a8c83d386db54857cc5a89048ceced86267fd73c89335b6b55753c4ed4d8611d1891065ff32fa7d62700849e36a98dcb4a8531070b3025071f4165dd75706ac29c8f159c2c9cc45c81c698e74335e94b8964350f442d210e1b29ae4aa86da1db50e098c42a641dffdc8bcafeab28eec4498e0a3c20e066fa94249ff0752bc44d35a907d5272c5354bf1d1d120565615bdbca7b7707a2d775c7e061c61680c614ff2b7bd5f87fa3424660369f5ae0fb58a6b3c5bfd6de9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [09:9c:37:23:50:d5:d4:d2:14:b0:2b:4d:6f:a7:8c:a9:ac:cd:4f:73] modulus: b56aae8b0d2dbbdd399ae95275a2a30999738f586cc40a296cfaf073d473426668f13b6dc6f0d8c8905f69e8c3024ef197f0eaa479f5a8419afeb21ed4d9c78cc50163166e996eca42f630cb20c52f6b6073f9219d1842c20e7ca89c473c719520983aa33a57450b554c052d9423ddd080c67f651fa19bd3206d98f01d65d75121ba32b893666c1c904781743c6eb0c26567ffe244fde212914c29e42ba885d8d7f5ae2fc4b2222bffe3212608c057957f82a3570e87be57d4d64c5d76e0213f8f452122003f8564f44079ec46a5da457c6820d10cf42f24381404bf86db27529b9115721d082304d0db797cd32e81bf8bd58f152c8899d72272ef5cf97ffa0b public exponent: 10001 ] 2022-03-13 04:11:06.039  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:11:06.040 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:11:06.041 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-13 04:11:06.042 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:11:06.042  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-13 04:11:06.043  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:11:06.043  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:11:06.043 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:11:06.044 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:11:06.044 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:11:06.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:11:06.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:11:06.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:11:06.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:11:06.260  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:11:06.261  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:11:06.262 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:11:06.262 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:11:06.264  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:11:06.265  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:11:06.265 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:11:06.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:11:06.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:11:06.267 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:11:06.268 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:11:06.268 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:11:06.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:11:06.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:11:06.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:11:06.270 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:11:06.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:06:af:7e:56:89:8f:e1:0b:8b:73:74:7a:56:0e:16:c0:03:78:b5] modulus: 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 public exponent: 10001 ] 2022-03-13 04:12:53.618  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:12:53.620 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:12:53.621 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-13 04:12:53.622 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:12:53.623  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-13 04:12:53.624  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:12:53.625  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:12:53.626 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:12:53.626 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:12:53.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:12:53.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:12:53.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:12:53.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:12:53.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:12:53.781  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:12:53.781  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:12:53.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:12:53.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:12:53.784  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:12:53.785  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:12:53.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:12:53.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:12:53.786 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:12:53.786 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:12:53.787 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:12:53.787 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:12:53.788 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:12:53.789 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:12:53.789 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:12:53.789 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:12:53.796 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:58:7a:dd:29:c6:98:36:64:bc:1f:ed:fa:56:86:4d:e4:34:85:1d] modulus: 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 public exponent: 10001 ] 2022-03-13 04:24:46.020  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:24:46.024 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:24:46.027 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-13 04:24:46.028 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:24:46.029  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-13 04:24:46.030  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:24:46.032  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:24:46.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:24:46.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:24:46.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:24:46.048 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:24:46.049 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:24:46.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:24:46.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:24:46.243  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:24:46.244  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:24:46.244 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:24:46.244 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:24:46.246  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:24:46.246  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:24:46.247 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:24:46.247 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:24:46.248 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:24:46.248 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:24:46.249 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:24:46.249 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:24:46.249 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:24:46.250 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:24:46.250 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:24:46.251 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:24:46.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:4b:55:fa:59:f9:3c:fb:c7:ce:c4:50:42:16:88:ff:96:c1:71:2f] modulus: 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 public exponent: 10001 ] 2022-03-13 04:28:34.836  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:28:34.838 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:28:34.841 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-13 04:28:34.842 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:28:34.842  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-13 04:28:34.846  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:28:34.846  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:28:34.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:28:34.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:28:34.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:28:34.854 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:28:34.856 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:28:34.857 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:28:34.858 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:28:35.105  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:28:35.105  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:28:35.106 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:28:35.106 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:28:35.108  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:28:35.108  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:28:35.108 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:28:35.109 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:28:35.109 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:28:35.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:28:35.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:28:35.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:28:35.111 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:28:35.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:28:35.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:28:35.113 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:28:35.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: bfb59aa5949569e4a58d3bb0c1c89870460ecf84394c3bceffac21063fa9430003034c0dfc18251a77a7ae28ca36cf7303df02d71e8e5974f584d659e6f711b0e9990e27ddcc538576bf9282520ccbf52731405e0a850352ce5e0438efae8303334cf26bbd099a8e525e9eef675d66cab7cd37bd0d7f0323de8e64d1100f7552914d2a6aaf44cd95bda9d72a1194e69fec6ff569b9773efede6c0edaa0a0a237a452cd4a35d63a7273e1b8645aeb995bdcefb19e9af5b6003bbb9c7fbc88110897d6f673edcccfe6ef3a8c83d386db54857cc5a89048ceced86267fd73c89335b6b55753c4ed4d8611d1891065ff32fa7d62700849e36a98dcb4a8531070b3025071f4165dd75706ac29c8f159c2c9cc45c81c698e74335e94b8964350f442d210e1b29ae4aa86da1db50e098c42a641dffdc8bcafeab28eec4498e0a3c20e066fa94249ff0752bc44d35a907d5272c5354bf1d1d120565615bdbca7b7707a2d775c7e061c61680c614ff2b7bd5f87fa3424660369f5ae0fb58a6b3c5bfd6de9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:83:0e:3a:7e:c9:ca:8c:b4:9e:67:04:42:df:4d:3b:e6:69:5e:be] modulus: a1915a013e1d4d190c6b09d12bd51ed217c9db8c213aea4f161a85aa1aafa8b1aae8740b49ba2e1b98b8020b3149c20ff63d89bf12217e98d5b7112652455d6ec644512ad4fbe20c8986343056023906f41e7bd13974f3e007651cfae61171c2bd407dcb5b1bc150a1a8bb9f72e757b0f9b2abdfc29d86bef732cc0857cd95b988ad7d53e34be93a71440e4848148763df9ef50de566e5800d1180aedbef4189020d0785e2f6f8fbc775d0ff4024040965590c6ea5a4bcad4f8c2fec5b10e8e32e7550c93ce8169f0586d1b1e1c0762df9ff1493a3d4304f1a09c389b2f36ce21824ecd7b069fb64b0fc5219702100854ebc666c2f7d0447c4687b19c507fdc9 public exponent: 10001 ] 2022-03-13 04:29:08.646  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:29:08.647 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:29:08.650 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-13 04:29:08.651 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:29:08.651  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-13 04:29:08.652  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:29:08.652  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:29:08.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:29:08.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:29:08.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:29:08.658 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:29:08.658 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:29:08.658 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:29:08.659 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:29:08.845  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:29:08.846  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:29:08.846 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:29:08.846 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:29:08.848  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:29:08.848  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:29:08.848 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:29:08.849 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:29:08.849 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:29:08.849 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:29:08.850 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:29:08.850 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:29:08.851 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:29:08.851 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:29:08.851 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:29:08.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:29:08.856 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:a6:06:50:9a:f9:66:87:b5:0c:eb:34:05:6e:ab:a9:a9:87:a2:3e] modulus: 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 public exponent: 10001 ] 2022-03-13 04:29:40.676  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:29:40.677 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:29:40.678 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-13 04:29:40.679 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:29:40.679  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-13 04:29:40.680  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:29:40.680  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:29:40.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:29:40.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:29:40.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:29:40.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:29:40.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:29:40.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:29:40.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:29:40.876  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:29:40.877  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:29:40.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:29:40.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:29:40.879  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:29:40.880  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:29:40.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:29:40.881 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:29:40.881 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:29:40.882 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:29:40.882 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:29:40.882 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:29:40.883 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:29:40.883 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:29:40.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:29:40.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:29:40.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:52:72:56:47:bd:0a:b9:58:5e:64:cb:d6:fd:eb:60:be:97:69:0c] modulus: d88c25464fc56300d7eec6db8c33ad17d4299d39ccd1e50495d01d38f166cacb1df613366fce731613054482635ad7c79c87dd816f5cec163d3a5a808e484e5985a6345e3ab740093dbc1bacb525fb456ce5b5ede405aeb2baa8b498d78eebdd2d702c3d5e70b6b25659a36f7b606d7cc38b18ed5143c97846175e7d5e4dbf86614870b11182f3508b09257387173551f52bb1bae239e60f79472784e74139c6275316fb91c79be0b3aca3574bf4f54075a1a65bd3a08a7b93b2c5678e3aa09eca9f278ac6b5028e64666f0258741b007e0b21bb02308389576ed53582daae224cf8cf3d37e687f75ac3b6cd482ba959bfdb4db4c9b9cea70c821ca42908e2e7 public exponent: 10001 ] 2022-03-13 04:31:29.088  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:31:29.089 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:31:29.090 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-13 04:31:29.100 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:31:29.101  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-13 04:31:29.104  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:31:29.105  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:31:29.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:31:29.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:31:29.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:31:29.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:31:29.119 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:31:29.119 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:31:29.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:31:29.324  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:31:29.325  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:31:29.325 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:31:29.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:31:29.327  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:31:29.328  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:31:29.328 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:31:29.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:31:29.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:31:29.332 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:31:29.333 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:31:29.333 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:31:29.334 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:31:29.334 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:31:29.334 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:31:29.337 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:31:29.343 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: bfb59aa5949569e4a58d3bb0c1c89870460ecf84394c3bceffac21063fa9430003034c0dfc18251a77a7ae28ca36cf7303df02d71e8e5974f584d659e6f711b0e9990e27ddcc538576bf9282520ccbf52731405e0a850352ce5e0438efae8303334cf26bbd099a8e525e9eef675d66cab7cd37bd0d7f0323de8e64d1100f7552914d2a6aaf44cd95bda9d72a1194e69fec6ff569b9773efede6c0edaa0a0a237a452cd4a35d63a7273e1b8645aeb995bdcefb19e9af5b6003bbb9c7fbc88110897d6f673edcccfe6ef3a8c83d386db54857cc5a89048ceced86267fd73c89335b6b55753c4ed4d8611d1891065ff32fa7d62700849e36a98dcb4a8531070b3025071f4165dd75706ac29c8f159c2c9cc45c81c698e74335e94b8964350f442d210e1b29ae4aa86da1db50e098c42a641dffdc8bcafeab28eec4498e0a3c20e066fa94249ff0752bc44d35a907d5272c5354bf1d1d120565615bdbca7b7707a2d775c7e061c61680c614ff2b7bd5f87fa3424660369f5ae0fb58a6b3c5bfd6de9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:ee:4f:e9:cf:be:93:b8:97:87:f8:f8:00:4b:2d:53:ad:37:fd:cd] modulus: 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 public exponent: 10001 ] 2022-03-13 04:31:56.680  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:31:56.682 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:31:56.683 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-13 04:31:56.684 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:31:56.684  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-13 04:31:56.685  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:31:56.685  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:31:56.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:31:56.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:31:56.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:31:56.692 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:31:56.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:31:56.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:31:56.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:31:56.946  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:31:56.948  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:31:56.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:31:56.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:31:56.949  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:31:56.950  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:31:56.950 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:31:56.950 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:31:56.950 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:31:56.951 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:31:56.951 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:31:56.951 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:31:56.952 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:31:56.952 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:31:56.952 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:31:56.953 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:31:56.956 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:46:44:4f:5e:43:9d:45:55:1c:f7:d0:35:79:23:b8:19:cb:cf:06] modulus: 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 public exponent: 10001 ] 2022-03-13 04:36:07.897  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:36:07.900 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:36:07.902 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-13 04:36:07.903 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:36:07.904  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-13 04:36:07.904  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:36:07.907  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:36:07.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:36:07.908 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:36:07.908 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:36:07.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:36:07.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:36:07.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:36:07.916 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:36:08.204  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:36:08.205  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:36:08.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:36:08.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:36:08.209  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:36:08.209  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:36:08.210 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:36:08.210 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:36:08.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:36:08.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:36:08.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:36:08.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:36:08.213 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:36:08.213 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:36:08.214 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:36:08.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:36:08.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:5d:cc:d3:21:0b:3d:78:56:96:97:46:ef:bb:57:32:4a:6d:21:2b] modulus: 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 public exponent: 10001 ] 2022-03-13 04:36:41.774  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-13 04:36:41.776 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-13 04:36:41.778 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-13 04:36:41.779 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-13 04:36:41.780  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-13 04:36:41.781  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-13 04:36:41.781  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-13 04:36:41.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-13 04:36:41.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-13 04:36:41.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-13 04:36:41.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-13 04:36:41.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:36:41.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-13 04:36:41.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:36:41.972  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-13 04:36:41.973  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-13 04:36:41.973 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-13 04:36:41.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-13 04:36:41.975  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-13 04:36:41.976  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-13 04:36:41.976 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:36:41.977 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:36:41.977 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:36:41.978 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:36:41.978 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:36:41.979 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:36:41.980 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-13 04:36:41.980 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-13 04:36:41.980 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-13 04:36:41.981 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-13 04:36:41.987 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 310821194979763829170039204527652041586697424659 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 13 02:59:15 UTC 2022 Final Date: Fri Mar 12 02:59:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a2:3b:06:d0:f3:03:02:b5:84:07:56:37:54:ea:90:89:11:ec:3b:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 717080d6e69bf18e71e177b3dd8bef62de25474e 2212b9b3f5f3103af47c04cf2419717d4d884c3c 48c923f565727744a2b18f24e108210b0d9fbd93 ddb573d3fd741cd9f303da30234e5251a81894f1 20795a0d77a55079bb1ebfee4947d0abddaa9e64 9ffd61da64414b5da227fa254ec54931ea211991 7861c1b795a384f3c88076f99fbe20176a201183 88abd13c915bb73b2d0144c74ce991c89a3cad74 d0fd11c5c000214982442d5443d0c45536152da5 24b27dad05350e2b37ffc8bd2aa54aedde95a66a 4d8afb7706e1cd78e268e4bc7d7f102a0770ffef e028265d28c5d3e69466d22416eff9bcdc23cb86 368bfbc5fdb6f5c7777d587e991b324696391983 0d3b19c2d0ce22b7c8d649a464e8f78936b7f8be 703126fed717e130350cd5be881cb0b02a651810 6708a8161d09cb1ca666edccf2c2fd611815c98d 1c61372743d6bd321e9ecd82f253e427b131fc1f be390519647b9add3831f706798a1153c29472de c0a6594713dd556084d1a15dd2283bdad585ef78 59dd1414 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:12:78:51:4e:82:84:78:ab:4e:4e:58:7c:fc:0d:80:9a:37:05:3d] modulus: e3184cb9e571d0942cca3e21cf0be9dd13955d709540ec9a1cc8bb6cfd10cb4b0a49df6e1b99a45fa3707b213057aa451ec472e1a3d1eb7951c3935bc6894a2c8337e6037348d8c5e7b095d1f7c51ff0eb0c73c90b407ac844e286fb20f214a88975d05bc6a88db81d1e1d10e95c82438501b7d2948eff879deb20079a271992c48c6a09e8e3df769eceedc94aa30cc7f5f34ec1a645e2e872f500ac8eef25f98ec0703b2e617e6e14f46db93e71d4b77f039973075bf7801ee1f9f9a8488542966fe9c5a7ea9cdc6ab5f5933063390b286daa98d8d4132597616e79946f342d5ca4a204511a9f47fc4f856a82d23ad05ab07502cde8c51e07e6833bcba1201f public exponent: 10001 ]