2022-03-14 03:18:43,740 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-14 03:18:45,039 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-14 03:18:46.063  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 14, 2022 3:18:48 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 14, 2022 3:18:48 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 14, 2022 3:18:48 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 14, 2022 3:18:48 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-14 03:18:49.272 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-14 03:18:49.573  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-14 03:18:49.786  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-14 03:18:50.753 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-14 03:18:50.756 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-14 03:18:50.757 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-14 03:18:50.768 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-14 03:18:50.827 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-03-14 03:18:50.832 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-03-14 03:18:50.972 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-14 03:18:51.808 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 14, 2022 3:18:52 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-14 03:18:53.135  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 10.719 seconds (JVM running for 13.878) Mar 14, 2022 3:19:14 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-14 04:05:30.683  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:05:30.702 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:05:30.760 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-14 04:05:30.766 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:05:30.792  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-14 04:05:30.796  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:05:30.797  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:05:30.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:05:30.800 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:05:30.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:05:30.815 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:05:30.822 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:05:30.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:05:30.904 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:05:30.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:05:30.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:05:31.857  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:05:31.862  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:05:31.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:05:31.865 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:05:31.884  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:05:31.886  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:05:31.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:05:31.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:05:31.888 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:05:31.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:05:31.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:05:31.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:05:31.935 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:05:31.936 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:05:31.937 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:05:31.940 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:05:31.989 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [88:6b:8b:65:fc:50:e5:09:66:1a:b2:d0:38:01:29:70:0f:60:30:19] modulus: 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 public exponent: 10001 ] 2022-03-14 04:06:49.242  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:06:49.244 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:06:49.249 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-14 04:06:49.250 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:06:49.251  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-14 04:06:49.251  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:06:49.252  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:06:49.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:06:49.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:06:49.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:06:49.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:06:49.281 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:06:49.281 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:06:49.282 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:06:49.461  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:06:49.462  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:06:49.463 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:06:49.463 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:06:49.467  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:06:49.467  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:06:49.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:06:49.469 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:06:49.469 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:06:49.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:06:49.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:06:49.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:06:49.473 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:06:49.474 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:06:49.474 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:06:49.476 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:06:49.481 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:10:3f:dc:4e:aa:4f:62:44:37:0c:77:e1:77:8e:79:2c:3b:38:b8] modulus: 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 public exponent: 10001 ] 2022-03-14 04:08:21.347  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:08:21.348 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:08:21.350 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:08:21.350 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:08:21.351  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:08:21.352  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:08:21.352  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:08:21.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:08:21.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:08:21.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:08:21.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:08:21.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:08:21.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:08:21.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:08:21.553  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:08:21.554  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:08:21.555 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:08:21.555 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:08:21.557  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:08:21.558  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:08:21.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:08:21.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:08:21.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:08:21.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:08:21.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:08:21.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:08:21.562 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:08:21.563 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:08:21.564 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:08:21.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:08:21.570 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:35:d0:f1:ac:2e:85:2a:6d:88:4b:34:30:23:2c:0d:03:66:3a:e1] modulus: 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 public exponent: 10001 ] 2022-03-14 04:09:58.844  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:09:58.846 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:09:58.848 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:09:58.848 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:09:58.849  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:09:58.850  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:09:58.851  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:09:58.851 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:09:58.851 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:09:58.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:09:58.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:09:58.857 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:09:58.858 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:09:58.858 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:09:59.025  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:09:59.026  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:09:59.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:09:59.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:09:59.029  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:09:59.029  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:09:59.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:09:59.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:09:59.031 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:09:59.031 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:09:59.032 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:09:59.032 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:09:59.033 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:09:59.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:09:59.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:09:59.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:09:59.039 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:8a:4c:71:e8:50:0b:9a:65:98:48:6f:a0:03:68:5f:0f:fd:1b:f6] modulus: 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 public exponent: 10001 ] 2022-03-14 04:10:31.316  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:10:31.320 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:10:31.326 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-14 04:10:31.327 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:10:31.328  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-14 04:10:31.329  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:10:31.330  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:10:31.330 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:10:31.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:10:31.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:10:31.338 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:10:31.339 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:10:31.340 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:10:31.340 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:10:31.472  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:10:31.473  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:10:31.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:10:31.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:10:31.477  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:10:31.477  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:10:31.479 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:10:31.479 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:10:31.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:10:31.481 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:10:31.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:10:31.483 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:10:31.484 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:10:31.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:10:31.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:10:31.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:10:31.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: c4c18f03b7dc5ef0c81be5691d5b1722bff2527bf8624c6d51dec4d5c9f7fff76200c7484e21293d387b94fe4abafe7c1b87c598dbedbb989c12873b92081c982793887a8d0e79cc25aca2a6f33caf24d8207cc3b0bb8732b1907d5f678351c38357bc5301f4daa2370e67ac0c8853bf15366088e7875e262f6e965662b9b3820a4e226d2847702ecf4b77f3d6aa4a1d667539e16893cca736abaf60843434a6a0abb85005dd23b705bee2feed5bbf1ed105b9b64f785bb58676ad1ed16ed4316b5090b424e167e36312f092502fc53d29a91cf515c56a4d2ab8d3219c9c30f09df63481a9284cf1cff0ae4ec4dd956f88c98e76d4be2d554d18ba1c8fc07ad99fe986518c6222c94728432f4dacb72ec5ad46f59d1d2930d614ec60ae6ccdbf619d50420e917fca18469c32feb10c7a5f86ab50ddd3a2079077d8aa2c0356b9204a500ffc2f85e94d3078879c3661342e06217172502fd04f8b17102041ce311d0dec45b2e467be03e78e1646d3dd75443ca51dba2c4a3c44176f96573e7595 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [84:9a:b0:b6:2f:50:8e:b1:43:e7:03:4d:08:89:46:49:ec:ca:e9:77] modulus: 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 public exponent: 10001 ] 2022-03-14 04:10:31.591  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:10:31.593 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:10:31.594 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-14 04:10:31.594 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:10:31.595  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-14 04:10:31.595  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:10:31.596  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:10:31.596 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:10:31.596 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:10:31.597 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:10:31.604 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:10:31.605 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:10:31.605 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:10:31.605 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:10:31.702  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:10:31.703  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:10:31.704 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:10:31.705 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:10:31.707  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:10:31.708  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:10:31.716 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:10:31.717 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:10:31.717 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:10:31.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:10:31.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:10:31.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:10:31.721 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:10:31.722 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:10:31.722 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:10:31.726 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:10:31.730 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:6f:f3:0c:26:25:ff:f7:51:44:a5:47:5d:b8:7e:0c:25:de:10:b5] modulus: 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 public exponent: 10001 ] 2022-03-14 04:11:07.907  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:11:07.908 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:11:07.920 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-14 04:11:07.929 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:11:07.932  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-14 04:11:07.933  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:11:07.933  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:11:07.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:11:07.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:11:07.935 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:11:07.941 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:11:07.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:11:07.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:11:07.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:11:08.078  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:11:08.079  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:11:08.079 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:11:08.080 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:11:08.082  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:11:08.082  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:11:08.083 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:11:08.083 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:11:08.083 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:11:08.084 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:11:08.084 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:11:08.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:11:08.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:11:08.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:11:08.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:11:08.087 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:11:08.091 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e3:a2:82:f1:f2:f0:23:d4:cb:c0:e7:9c:f3:0b:9f:0c:92:54:e2:c2] modulus: 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 public exponent: 10001 ] 2022-03-14 04:12:50.841  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:12:50.842 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:12:50.844 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-14 04:12:50.844 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:12:50.845  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-14 04:12:50.845  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:12:50.846  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:12:50.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:12:50.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:12:50.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:12:50.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:12:50.853 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:12:50.853 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:12:50.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:12:51.048  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:12:51.049  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:12:51.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:12:51.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:12:51.051  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:12:51.052  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:12:51.052 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:12:51.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:12:51.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:12:51.054 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:12:51.055 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:12:51.055 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:12:51.056 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:12:51.056 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:12:51.057 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:12:51.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:12:51.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: c4c18f03b7dc5ef0c81be5691d5b1722bff2527bf8624c6d51dec4d5c9f7fff76200c7484e21293d387b94fe4abafe7c1b87c598dbedbb989c12873b92081c982793887a8d0e79cc25aca2a6f33caf24d8207cc3b0bb8732b1907d5f678351c38357bc5301f4daa2370e67ac0c8853bf15366088e7875e262f6e965662b9b3820a4e226d2847702ecf4b77f3d6aa4a1d667539e16893cca736abaf60843434a6a0abb85005dd23b705bee2feed5bbf1ed105b9b64f785bb58676ad1ed16ed4316b5090b424e167e36312f092502fc53d29a91cf515c56a4d2ab8d3219c9c30f09df63481a9284cf1cff0ae4ec4dd956f88c98e76d4be2d554d18ba1c8fc07ad99fe986518c6222c94728432f4dacb72ec5ad46f59d1d2930d614ec60ae6ccdbf619d50420e917fca18469c32feb10c7a5f86ab50ddd3a2079077d8aa2c0356b9204a500ffc2f85e94d3078879c3661342e06217172502fd04f8b17102041ce311d0dec45b2e467be03e78e1646d3dd75443ca51dba2c4a3c44176f96573e7595 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [96:2f:b0:74:df:8a:80:91:ed:d7:a3:bc:e7:cd:f8:1b:36:68:81:7d] modulus: cc462d5077cc5e8938777dbfd4d8651bca9ad83d2d1601274c395dcfebb2ff4cf7f0ef4359d8443580538b953fd4f2cd557e8a80ca49eccba5e3b8590b8e8ff2cc779e7b6615c9f9cc3c1aa537bdc4417e631c6dcc3b8c262d3f6359475a88d299505acf13fca32751b4fade4b5492f571b69c2480290ceb80ce30055298e2c2e87bfea007b5f8e7119fabfdb98b8f7f1ab7ed04b46159906a7e4fbba9b0ce6074de2e2ac43b78491cd0e4cea2069bf2dd7459c9f3ab1f00a025197efe197bbb5a17e7603b5e5e2d172ec20b5bafb4eeb9503514a79173060e0c4921549659605f2c4d2e795718504976de2094fc99640aeb94692e0d31e303b99c81fb4df25b public exponent: 10001 ] 2022-03-14 04:24:29.084  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:24:29.087 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:24:29.089 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-14 04:24:29.090 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:24:29.091  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-14 04:24:29.091  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:24:29.092  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:24:29.092 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:24:29.093 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:24:29.093 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:24:29.099 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:24:29.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:24:29.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:24:29.101 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:24:29.301  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:24:29.302  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:24:29.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:24:29.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:24:29.305  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:24:29.305  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:24:29.306 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:24:29.306 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:24:29.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:24:29.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:24:29.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:24:29.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:24:29.310 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:24:29.310 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:24:29.310 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:24:29.312 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:24:29.315 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:35:49:15:c8:52:24:65:e0:4f:1b:28:12:38:2a:e8:bc:5c:94:04] modulus: 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 public exponent: 10001 ] 2022-03-14 04:28:17.269  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:28:17.270 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:28:17.272 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:28:17.272 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:28:17.277  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:28:17.278  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:28:17.278  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:28:17.278 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:28:17.279 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:28:17.280 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:28:17.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:28:17.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:28:17.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:28:17.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:28:17.466  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:28:17.466  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:28:17.466 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:28:17.467 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:28:17.468  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:28:17.469  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:28:17.469 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:28:17.470 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:28:17.470 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:28:17.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:28:17.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:28:17.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:28:17.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:28:17.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:28:17.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:28:17.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:28:17.482 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:46:61:96:a5:4d:ba:10:ef:79:b5:d7:75:59:19:34:9e:6b:29:94] modulus: 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 public exponent: 10001 ] 2022-03-14 04:28:50.685  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:28:50.686 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:28:50.688 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-14 04:28:50.689 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:28:50.690  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-14 04:28:50.691  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:28:50.692  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:28:50.692 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:28:50.693 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:28:50.693 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:28:50.699 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:28:50.700 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:28:50.700 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:28:50.701 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:28:50.870  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:28:50.871  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:28:50.871 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:28:50.871 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:28:50.873  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:28:50.873  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:28:50.874 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:28:50.874 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:28:50.874 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:28:50.875 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:28:50.875 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:28:50.875 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:28:50.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:28:50.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:28:50.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:28:50.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:28:50.881 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:32:e6:51:86:3e:10:08:34:1c:0c:22:88:d2:1a:69:64:b9:8d:15] modulus: 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 public exponent: 10001 ] 2022-03-14 04:29:24.297  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:29:24.299 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:29:24.302 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-14 04:29:24.303 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:29:24.303  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-14 04:29:24.304  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:29:24.304  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:29:24.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:29:24.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:29:24.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:29:24.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:29:24.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:29:24.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:29:24.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:29:24.448  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:29:24.449  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:29:24.449 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:29:24.449 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:29:24.451  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:29:24.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:29:24.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:29:24.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:29:24.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:29:24.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:29:24.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:29:24.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:29:24.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:29:24.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:29:24.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:29:24.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:29:24.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: c4c18f03b7dc5ef0c81be5691d5b1722bff2527bf8624c6d51dec4d5c9f7fff76200c7484e21293d387b94fe4abafe7c1b87c598dbedbb989c12873b92081c982793887a8d0e79cc25aca2a6f33caf24d8207cc3b0bb8732b1907d5f678351c38357bc5301f4daa2370e67ac0c8853bf15366088e7875e262f6e965662b9b3820a4e226d2847702ecf4b77f3d6aa4a1d667539e16893cca736abaf60843434a6a0abb85005dd23b705bee2feed5bbf1ed105b9b64f785bb58676ad1ed16ed4316b5090b424e167e36312f092502fc53d29a91cf515c56a4d2ab8d3219c9c30f09df63481a9284cf1cff0ae4ec4dd956f88c98e76d4be2d554d18ba1c8fc07ad99fe986518c6222c94728432f4dacb72ec5ad46f59d1d2930d614ec60ae6ccdbf619d50420e917fca18469c32feb10c7a5f86ab50ddd3a2079077d8aa2c0356b9204a500ffc2f85e94d3078879c3661342e06217172502fd04f8b17102041ce311d0dec45b2e467be03e78e1646d3dd75443ca51dba2c4a3c44176f96573e7595 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:e0:a6:99:0d:93:99:76:97:ea:d6:a7:a8:af:a8:eb:aa:47:39:1e] modulus: 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 public exponent: 10001 ] 2022-03-14 04:31:11.852  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:31:11.858 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:31:11.860 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-14 04:31:11.861 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:31:11.861  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-14 04:31:11.862  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:31:11.863  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:31:11.863 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:31:11.864 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:31:11.867 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:31:11.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:31:11.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:31:11.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:31:11.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:31:12.023  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:31:12.024  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:31:12.024 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:31:12.024 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:31:12.026  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:31:12.027  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:31:12.027 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:31:12.027 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:31:12.027 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:31:12.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:31:12.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:31:12.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:31:12.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:31:12.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:31:12.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:31:12.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:31:12.034 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:ee:e0:74:c0:3d:fe:7a:d7:ca:d8:2a:7e:22:19:cd:39:3a:07:f2] modulus: c54db6152a4b2f3af9ac2939e9318e7bc7cde0a4d045d9893a8d6adceb013a09203a93c8d82417f66a3998730911c18604e17ab2f98d0d0dc82fee00a671edf74500345dd760e6a663a281d10e4dcc5e4cb17c3ba5cf4866b724f5dfc497a2970b5b8b9f40730db569cd4816512636c6fffa277521b8f99cc64d1ef766d0997fbe537bf40fbbdef882d844055ff4d104f70080f5da3b01adb5bbfaeab556296ae3b211da8adbfde12f9bd0babacc9fce192db92591af6012dc3256d7522527a41175424c58c5677a963407c249a95f655950a1163361e913448f2f50c243dfb690a0183d57776bee3699e72800a58d8c17d8a4a71dbaf3ace725e27e909db295 public exponent: 10001 ] 2022-03-14 04:31:39.903  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:31:39.905 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:31:39.906 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-14 04:31:39.907 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:31:39.908  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-14 04:31:39.908  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:31:39.909  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:31:39.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:31:39.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:31:39.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:31:39.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:31:39.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:31:39.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:31:39.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:31:40.070  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:31:40.070  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:31:40.071 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:31:40.071 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:31:40.072  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:31:40.073  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:31:40.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:31:40.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:31:40.074 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:31:40.074 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:31:40.074 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:31:40.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:31:40.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:31:40.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:31:40.076 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:31:40.076 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:31:40.079 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: c4c18f03b7dc5ef0c81be5691d5b1722bff2527bf8624c6d51dec4d5c9f7fff76200c7484e21293d387b94fe4abafe7c1b87c598dbedbb989c12873b92081c982793887a8d0e79cc25aca2a6f33caf24d8207cc3b0bb8732b1907d5f678351c38357bc5301f4daa2370e67ac0c8853bf15366088e7875e262f6e965662b9b3820a4e226d2847702ecf4b77f3d6aa4a1d667539e16893cca736abaf60843434a6a0abb85005dd23b705bee2feed5bbf1ed105b9b64f785bb58676ad1ed16ed4316b5090b424e167e36312f092502fc53d29a91cf515c56a4d2ab8d3219c9c30f09df63481a9284cf1cff0ae4ec4dd956f88c98e76d4be2d554d18ba1c8fc07ad99fe986518c6222c94728432f4dacb72ec5ad46f59d1d2930d614ec60ae6ccdbf619d50420e917fca18469c32feb10c7a5f86ab50ddd3a2079077d8aa2c0356b9204a500ffc2f85e94d3078879c3661342e06217172502fd04f8b17102041ce311d0dec45b2e467be03e78e1646d3dd75443ca51dba2c4a3c44176f96573e7595 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:36:7e:a6:e7:27:ee:4f:bd:f5:2f:25:67:89:6d:3b:aa:c7:26:c7] modulus: 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 public exponent: 10001 ] 2022-03-14 04:35:30.304  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:35:30.307 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:35:30.310 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:35:30.316 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:35:30.317  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-14 04:35:30.317  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:35:30.318  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:35:30.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:35:30.321 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:35:30.321 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:35:30.327 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:35:30.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:35:30.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:35:30.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:35:30.485  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:35:30.486  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:35:30.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:35:30.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:35:30.488  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:35:30.488  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:35:30.489 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:35:30.489 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:35:30.489 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:35:30.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:35:30.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:35:30.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:35:30.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:35:30.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:35:30.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:35:30.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:35:30.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:d2:0d:41:8d:b2:24:0b:41:8e:2a:0a:fd:01:38:0e:ee:9d:32:ae] modulus: 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 public exponent: 10001 ] 2022-03-14 04:36:02.695  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-14 04:36:02.696 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-14 04:36:02.698 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-14 04:36:02.698 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-14 04:36:02.699  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-14 04:36:02.700  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-14 04:36:02.700  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-14 04:36:02.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-14 04:36:02.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-14 04:36:02.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-14 04:36:02.707 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-14 04:36:02.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:36:02.708 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-14 04:36:02.710 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:36:02.871  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-14 04:36:02.872  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-14 04:36:02.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-14 04:36:02.873 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-14 04:36:02.874  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-14 04:36:02.875  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-14 04:36:02.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:36:02.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:36:02.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:36:02.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:36:02.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:36:02.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:36:02.877 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-14 04:36:02.877 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-14 04:36:02.878 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-14 04:36:02.878 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-14 04:36:02.882 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 638930817773106375351041932717010608648527796146 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 14 02:57:29 UTC 2022 Final Date: Sat Mar 13 02:57:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:89:9e:64:73:58:63:4f:db:a5:62:29:fe:47:bd:ca:3b:bb:36:15] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0a5b2934386dfdb33a2a8085ae5782c057e5ef1b 3e48896f0a28030d0824e736de272842ee33657d 65b1e78b92019bb2bf3c19060843c702e5f709df b9277188ec55c088b0e1236c140f4d7f42e544c9 df139a0a0b64cfcb15f98c5a0a3ae21977ccaf83 51d864d3413f8a39dd54b8b589ba257cb05fcbc8 be38d4993298d30c153abaffec579b52ca3240ca 2bc560ea6cb9203cfca9f54f4ae19304d2e868fe 2d50de04047b4cc86d35cf360fffd564ae2bb24d 3319f3cb9bcf4776764e4f3f5c90263d69397f2b 9e7c38d684211a30d36234e7898cb4191b58dc2a 037c0da7878640dd901ee2e85f352d76ee94d567 95ef8f4c007b06b47ee94c4f0fd5ddd9333e1aa5 2ac30e79a994289a73a45459b3670dce9351e1cd 2637e72ac6d24b20c32ee2060d8b3ff7014e4fe3 bf39212b49896d21d9fdbeb1d1ca3ddf13b7d568 266909f525a8de3cd5bcb2dc1323a1f499fb2087 e8a9b18354d219e5f1f808b18b4e332723c90dc2 f7604f26a1e0171da2bde3a931f781dcb264df1f b5315125 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:ed:c5:45:a4:c0:92:f0:ee:c6:08:29:e4:3f:c2:89:f3:09:35:ae] modulus: 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 public exponent: 10001 ]