2022-03-16 03:07:29,147 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-16 03:07:30,772 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-16 03:07:32.002  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 16, 2022 3:07:35 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 16, 2022 3:07:35 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 16, 2022 3:07:35 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 16, 2022 3:07:35 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-16 03:07:36.542 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-16 03:07:37.010  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-16 03:07:37.263  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-16 03:07:39.099 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-16 03:07:39.104 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-16 03:07:39.107 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-16 03:07:39.112 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-16 03:07:39.158 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-03-16 03:07:39.165 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-16 03:07:39.329 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-16 03:07:41.310 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 16, 2022 3:07:43 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-16 03:07:44.415  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 16.754 seconds (JVM running for 19.395) Mar 16, 2022 3:08:03 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-16 03:08:34.175  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-16 03:08:34.187 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-16 03:08:34.236 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-16 03:08:34.241 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-16 03:08:34.274  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-16 03:08:34.277  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-16 03:08:34.278  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-16 03:08:34.280 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-16 03:08:34.281 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 03:08:34.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-16 03:08:34.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-16 03:08:34.300 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-16 03:08:34.365 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-16 03:08:34.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 03:08:34.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 03:08:34.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 03:08:35.220  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-16 03:08:35.223  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-16 03:08:35.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-16 03:08:35.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 03:08:35.237  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-16 03:08:35.239  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-16 03:08:35.240 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 03:08:35.241 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 03:08:35.241 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 03:08:35.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 03:08:35.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 03:08:35.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 03:08:35.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 03:08:35.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 03:08:35.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 03:08:35.268 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-16 03:08:35.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 17865632311015270959334926179901422084714704851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 16 03:03:42 UTC 2022 Final Date: Mon Mar 15 03:03:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:1e:09:08:61:59:77:51:29:13:d3:8a:60:b7:8c:c5:1e:fb:b2:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 142f485772d6241d077bc8ec034a6a9606933309 e3ecea6517014614ee8808a482ab449ad27bfdd6 99a34b10d6717af5a2af6ee88f542a5eb45462d0 d89b0c3162df17300048590e83253c57a34fbfba 95507b0c82c62b0cc5b162aeac413679620f2399 d376c6d9d869350b09ded4c61506ad4bb1e9086f a87761e2074c23b6c7d0f40baaa31848dfe229e2 1d02f05ffb6f58726b7e9b513a152e59da067494 8eeb14a3da581d409062884fb047c53cfd3d5c9e 1c19484630f5fda6b917fded7bfea8bb4f502278 075cd81027dd19fb58eca82bb3d0e6d79a3da7a6 e89a86c342c74872d1bf70282a7d6184dfad85ec 2af5f898c4e3f9013a442d7348b699f26e69d999 db5b07cb92c0b25b61ff34b3790b9441f597b0e6 652ee55ec130e8e6708fc3e75f9659ebfa11f28a 9dfd7c5d939faa7365d45c432be649d65517f8a0 d678188e74c6ae23ec3f8268e2b9462abd2d2eb2 89f2b3776965ad6cf7ebf1c5805b043fc3718d48 a43c68fe44690d8fee009fe0c676d07e86847631 ee02ee5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:36:d5:34:46:ff:db:0c:0b:2c:63:d2:68:26:49:07:6a:03:ae:40] modulus: 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 public exponent: 10001 ] 2022-03-16 04:13:01.631  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-16 04:13:01.637 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-16 04:13:01.643 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-16 04:13:01.645 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-16 04:13:01.648  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-16 04:13:01.651  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-16 04:13:01.655  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-16 04:13:01.655 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-16 04:13:01.656 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-16 04:13:01.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-16 04:13:01.668 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-16 04:13:01.670 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:13:01.671 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:13:01.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:13:01.904  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-16 04:13:01.910  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-16 04:13:01.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-16 04:13:01.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:13:01.935  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-16 04:13:01.937  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-16 04:13:01.939 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:13:01.939 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:13:01.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:13:01.943 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:13:01.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:13:01.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:13:01.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:13:01.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:13:01.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:13:01.966 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-16 04:13:01.972 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 17865632311015270959334926179901422084714704851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 16 03:03:42 UTC 2022 Final Date: Mon Mar 15 03:03:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:1e:09:08:61:59:77:51:29:13:d3:8a:60:b7:8c:c5:1e:fb:b2:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 142f485772d6241d077bc8ec034a6a9606933309 e3ecea6517014614ee8808a482ab449ad27bfdd6 99a34b10d6717af5a2af6ee88f542a5eb45462d0 d89b0c3162df17300048590e83253c57a34fbfba 95507b0c82c62b0cc5b162aeac413679620f2399 d376c6d9d869350b09ded4c61506ad4bb1e9086f a87761e2074c23b6c7d0f40baaa31848dfe229e2 1d02f05ffb6f58726b7e9b513a152e59da067494 8eeb14a3da581d409062884fb047c53cfd3d5c9e 1c19484630f5fda6b917fded7bfea8bb4f502278 075cd81027dd19fb58eca82bb3d0e6d79a3da7a6 e89a86c342c74872d1bf70282a7d6184dfad85ec 2af5f898c4e3f9013a442d7348b699f26e69d999 db5b07cb92c0b25b61ff34b3790b9441f597b0e6 652ee55ec130e8e6708fc3e75f9659ebfa11f28a 9dfd7c5d939faa7365d45c432be649d65517f8a0 d678188e74c6ae23ec3f8268e2b9462abd2d2eb2 89f2b3776965ad6cf7ebf1c5805b043fc3718d48 a43c68fe44690d8fee009fe0c676d07e86847631 ee02ee5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:ac:20:30:52:bb:6e:02:f8:a3:d7:cf:b8:e7:dc:9b:dd:4d:a9:6c] modulus: c42fceb726787ac5ca804705abfca3371b2d230b393c95d2fe477175c498b66af478dfd4856dd55d303cd15da72999632256c7477844bb88e265d323ef69928962be9bcc6e4797604ab52e43f090a0db0b5e4b1372581d57dfce5895a6894239f3e565d1fc6c485b2ab4dec07d491ea35f3dcff5fe1340b37b9e9c7d4b42d843a551723c6f879bbba3408550036b316ec2d627c24878c0280a910bf58865488d965cb1426008ddda10a2b5e09961571dfb9f0824de9b26aaf19a763fcc3162f0b58aa474aed5c8e63e0427eba0a6a52a8ebfc966a704f12827e946e7b23c93badfb5d2f40df51354077289cc5b3131bbb6ec088aaa2da79fafd8019134a7ec9f public exponent: 10001 ] 2022-03-16 04:14:09.629  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-16 04:14:09.630 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-16 04:14:09.632 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-16 04:14:09.633 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-16 04:14:09.634  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-16 04:14:09.635  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-16 04:14:09.636  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-16 04:14:09.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-16 04:14:09.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-16 04:14:09.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-16 04:14:09.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-16 04:14:09.659 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:14:09.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:14:09.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:14:09.860  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-16 04:14:09.861  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-16 04:14:09.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-16 04:14:09.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:14:09.866  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-16 04:14:09.868  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-16 04:14:09.869 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:14:09.870 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:14:09.870 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:14:09.872 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:14:09.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:14:09.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:14:09.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:14:09.876 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:14:09.876 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:14:09.878 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-16 04:14:09.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 17865632311015270959334926179901422084714704851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 16 03:03:42 UTC 2022 Final Date: Mon Mar 15 03:03:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:1e:09:08:61:59:77:51:29:13:d3:8a:60:b7:8c:c5:1e:fb:b2:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 142f485772d6241d077bc8ec034a6a9606933309 e3ecea6517014614ee8808a482ab449ad27bfdd6 99a34b10d6717af5a2af6ee88f542a5eb45462d0 d89b0c3162df17300048590e83253c57a34fbfba 95507b0c82c62b0cc5b162aeac413679620f2399 d376c6d9d869350b09ded4c61506ad4bb1e9086f a87761e2074c23b6c7d0f40baaa31848dfe229e2 1d02f05ffb6f58726b7e9b513a152e59da067494 8eeb14a3da581d409062884fb047c53cfd3d5c9e 1c19484630f5fda6b917fded7bfea8bb4f502278 075cd81027dd19fb58eca82bb3d0e6d79a3da7a6 e89a86c342c74872d1bf70282a7d6184dfad85ec 2af5f898c4e3f9013a442d7348b699f26e69d999 db5b07cb92c0b25b61ff34b3790b9441f597b0e6 652ee55ec130e8e6708fc3e75f9659ebfa11f28a 9dfd7c5d939faa7365d45c432be649d65517f8a0 d678188e74c6ae23ec3f8268e2b9462abd2d2eb2 89f2b3776965ad6cf7ebf1c5805b043fc3718d48 a43c68fe44690d8fee009fe0c676d07e86847631 ee02ee5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:66:a5:0e:37:1f:d3:af:fb:e4:1c:bf:5d:e5:67:e2:8d:97:ef:06] modulus: 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 public exponent: 10001 ] 2022-03-16 04:15:45.568  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-16 04:15:45.570 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-16 04:15:45.573 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-16 04:15:45.574 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-16 04:15:45.574  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-16 04:15:45.577  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-16 04:15:45.579  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-16 04:15:45.580 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-16 04:15:45.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-16 04:15:45.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-16 04:15:45.591 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-16 04:15:45.593 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:15:45.593 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:15:45.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:15:45.829  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-16 04:15:45.830  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-16 04:15:45.831 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-16 04:15:45.831 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:15:45.834  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-16 04:15:45.835  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-16 04:15:45.835 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:15:45.836 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:15:45.836 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:15:45.837 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:15:45.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:15:45.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:15:45.839 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:15:45.840 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:15:45.840 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:15:45.841 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-16 04:15:45.848 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 17865632311015270959334926179901422084714704851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 16 03:03:42 UTC 2022 Final Date: Mon Mar 15 03:03:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:1e:09:08:61:59:77:51:29:13:d3:8a:60:b7:8c:c5:1e:fb:b2:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 142f485772d6241d077bc8ec034a6a9606933309 e3ecea6517014614ee8808a482ab449ad27bfdd6 99a34b10d6717af5a2af6ee88f542a5eb45462d0 d89b0c3162df17300048590e83253c57a34fbfba 95507b0c82c62b0cc5b162aeac413679620f2399 d376c6d9d869350b09ded4c61506ad4bb1e9086f a87761e2074c23b6c7d0f40baaa31848dfe229e2 1d02f05ffb6f58726b7e9b513a152e59da067494 8eeb14a3da581d409062884fb047c53cfd3d5c9e 1c19484630f5fda6b917fded7bfea8bb4f502278 075cd81027dd19fb58eca82bb3d0e6d79a3da7a6 e89a86c342c74872d1bf70282a7d6184dfad85ec 2af5f898c4e3f9013a442d7348b699f26e69d999 db5b07cb92c0b25b61ff34b3790b9441f597b0e6 652ee55ec130e8e6708fc3e75f9659ebfa11f28a 9dfd7c5d939faa7365d45c432be649d65517f8a0 d678188e74c6ae23ec3f8268e2b9462abd2d2eb2 89f2b3776965ad6cf7ebf1c5805b043fc3718d48 a43c68fe44690d8fee009fe0c676d07e86847631 ee02ee5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:51:48:af:9f:a0:a3:4a:0f:a8:66:28:ed:27:44:8e:03:40:cf:e6] modulus: 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 public exponent: 10001 ] 2022-03-16 04:17:37.216  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-16 04:17:37.218 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-16 04:17:37.225 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-16 04:17:37.227 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-16 04:17:37.228  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-16 04:17:37.231  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-16 04:17:37.231  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-16 04:17:37.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-16 04:17:37.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-16 04:17:37.233 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-16 04:17:37.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-16 04:17:37.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:17:37.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:17:37.241 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:17:37.421  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-16 04:17:37.422  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-16 04:17:37.423 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-16 04:17:37.423 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:17:37.429  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-16 04:17:37.431  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-16 04:17:37.440 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:17:37.444 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:17:37.445 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:17:37.446 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:17:37.447 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:17:37.447 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:17:37.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:17:37.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:17:37.449 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:17:37.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-16 04:17:37.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 17865632311015270959334926179901422084714704851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 16 03:03:42 UTC 2022 Final Date: Mon Mar 15 03:03:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:1e:09:08:61:59:77:51:29:13:d3:8a:60:b7:8c:c5:1e:fb:b2:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 142f485772d6241d077bc8ec034a6a9606933309 e3ecea6517014614ee8808a482ab449ad27bfdd6 99a34b10d6717af5a2af6ee88f542a5eb45462d0 d89b0c3162df17300048590e83253c57a34fbfba 95507b0c82c62b0cc5b162aeac413679620f2399 d376c6d9d869350b09ded4c61506ad4bb1e9086f a87761e2074c23b6c7d0f40baaa31848dfe229e2 1d02f05ffb6f58726b7e9b513a152e59da067494 8eeb14a3da581d409062884fb047c53cfd3d5c9e 1c19484630f5fda6b917fded7bfea8bb4f502278 075cd81027dd19fb58eca82bb3d0e6d79a3da7a6 e89a86c342c74872d1bf70282a7d6184dfad85ec 2af5f898c4e3f9013a442d7348b699f26e69d999 db5b07cb92c0b25b61ff34b3790b9441f597b0e6 652ee55ec130e8e6708fc3e75f9659ebfa11f28a 9dfd7c5d939faa7365d45c432be649d65517f8a0 d678188e74c6ae23ec3f8268e2b9462abd2d2eb2 89f2b3776965ad6cf7ebf1c5805b043fc3718d48 a43c68fe44690d8fee009fe0c676d07e86847631 ee02ee5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:4f:6e:0c:a0:db:38:cb:fb:5b:0f:b1:c6:33:f4:ea:87:7f:78:7b] modulus: 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 public exponent: 10001 ] 2022-03-16 04:18:12.221  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-16 04:18:12.223 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-16 04:18:12.225 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-16 04:18:12.226 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-16 04:18:12.236  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-16 04:18:12.237  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-16 04:18:12.238  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-16 04:18:12.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-16 04:18:12.239 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-16 04:18:12.240 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-16 04:18:12.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-16 04:18:12.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:18:12.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:18:12.251 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:18:12.394  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-16 04:18:12.395  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-16 04:18:12.396 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-16 04:18:12.396 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:18:12.398  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-16 04:18:12.399  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-16 04:18:12.400 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:18:12.400 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:18:12.400 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:18:12.401 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:18:12.402 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:18:12.402 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:18:12.403 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:18:12.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:18:12.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:18:12.405 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-16 04:18:12.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 17865632311015270959334926179901422084714704851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 16 03:03:42 UTC 2022 Final Date: Mon Mar 15 03:03:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:1e:09:08:61:59:77:51:29:13:d3:8a:60:b7:8c:c5:1e:fb:b2:78] modulus: bdefc27b03711f8b7662384156d2b4e5050f683a99e19ec6b0f5423e8d31cec76cc2fc544b2d92a5cd9c17c1925cddf81dbfd62c0740752315aedc31daefe507a1c6fa12fa02a4479d910c58e478cbb787c316f4159ab3cf6c8416842f2bfa3f6da3d2ba895cdd0675f19a1863c6893c6193d90129510c056d541c27fbbb9b0ab0538ebc98bdd9123da96311214adbb002138d81a5bea4585b6b1d85944ac7dd65b3490a1b59db2d5d94e203b12d0294bd286c58a29678c5a434ed4f2527a02acfddea22b37a0b8af2c07edb21898114cafcf63d18d3586bb4a4e6221327fd5460c6dec184bdcaf46d62f64dcda4cebe67d2dffa65cc86c95982628aa8849bb6e9f001ab6343b2530472cf5b5e3247d871ded5463abd7068273a0b304a987e870166f55535ea8cacdfd9e792aeca8755afd2424256455a3dba347a2477bf50567d1e3470141f14d956a988e6054988ed93f0bd4ef18d54d651012691dff369b5d6f0c1119f36f1e39ddb10a0c4b9b4045fa3091c2e417ee42a3c17652df8f483 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 142f485772d6241d077bc8ec034a6a9606933309 e3ecea6517014614ee8808a482ab449ad27bfdd6 99a34b10d6717af5a2af6ee88f542a5eb45462d0 d89b0c3162df17300048590e83253c57a34fbfba 95507b0c82c62b0cc5b162aeac413679620f2399 d376c6d9d869350b09ded4c61506ad4bb1e9086f a87761e2074c23b6c7d0f40baaa31848dfe229e2 1d02f05ffb6f58726b7e9b513a152e59da067494 8eeb14a3da581d409062884fb047c53cfd3d5c9e 1c19484630f5fda6b917fded7bfea8bb4f502278 075cd81027dd19fb58eca82bb3d0e6d79a3da7a6 e89a86c342c74872d1bf70282a7d6184dfad85ec 2af5f898c4e3f9013a442d7348b699f26e69d999 db5b07cb92c0b25b61ff34b3790b9441f597b0e6 652ee55ec130e8e6708fc3e75f9659ebfa11f28a 9dfd7c5d939faa7365d45c432be649d65517f8a0 d678188e74c6ae23ec3f8268e2b9462abd2d2eb2 89f2b3776965ad6cf7ebf1c5805b043fc3718d48 a43c68fe44690d8fee009fe0c676d07e86847631 ee02ee5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:10:fa:15:23:96:51:2d:1d:8d:9f:7b:3b:74:a8:12:1a:e8:a1:96] modulus: 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 public exponent: 10001 ] 2022-03-16 04:18:45.328  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-16 04:18:45.330 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-16 04:18:45.332 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-16 04:18:45.333 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-16 04:18:45.333  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-16 04:18:45.334  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-16 04:18:45.335  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-16 04:18:45.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-16 04:18:45.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-16 04:18:45.337 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-16 04:18:45.348 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-16 04:18:45.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:18:45.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:18:45.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:18:45.565  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-16 04:18:45.569  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-16 04:18:45.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-16 04:18:45.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:18:45.572  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-16 04:18:45.572  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-16 04:18:45.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:18:45.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:18:45.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:18:45.575 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:18:45.575 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:18:45.576 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:18:45.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:18:45.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:18:45.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:18:45.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-16 04:18:45.585 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 17865632311015270959334926179901422084714704851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 16 03:03:42 UTC 2022 Final Date: Mon Mar 15 03:03:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:1e:09:08:61:59:77:51:29:13:d3:8a:60:b7:8c:c5:1e:fb:b2:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 142f485772d6241d077bc8ec034a6a9606933309 e3ecea6517014614ee8808a482ab449ad27bfdd6 99a34b10d6717af5a2af6ee88f542a5eb45462d0 d89b0c3162df17300048590e83253c57a34fbfba 95507b0c82c62b0cc5b162aeac413679620f2399 d376c6d9d869350b09ded4c61506ad4bb1e9086f a87761e2074c23b6c7d0f40baaa31848dfe229e2 1d02f05ffb6f58726b7e9b513a152e59da067494 8eeb14a3da581d409062884fb047c53cfd3d5c9e 1c19484630f5fda6b917fded7bfea8bb4f502278 075cd81027dd19fb58eca82bb3d0e6d79a3da7a6 e89a86c342c74872d1bf70282a7d6184dfad85ec 2af5f898c4e3f9013a442d7348b699f26e69d999 db5b07cb92c0b25b61ff34b3790b9441f597b0e6 652ee55ec130e8e6708fc3e75f9659ebfa11f28a 9dfd7c5d939faa7365d45c432be649d65517f8a0 d678188e74c6ae23ec3f8268e2b9462abd2d2eb2 89f2b3776965ad6cf7ebf1c5805b043fc3718d48 a43c68fe44690d8fee009fe0c676d07e86847631 ee02ee5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:ba:ff:51:40:33:bd:24:fd:f5:ca:7a:5e:bd:23:df:eb:84:65:d7] modulus: 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 public exponent: 10001 ] 2022-03-16 04:19:19.484  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-16 04:19:19.485 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-16 04:19:19.491 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-16 04:19:19.500 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-16 04:19:19.501  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-16 04:19:19.502  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-16 04:19:19.502  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-16 04:19:19.502 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-16 04:19:19.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-16 04:19:19.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-16 04:19:19.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-16 04:19:19.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:19:19.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:19:19.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:19:19.850  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-16 04:19:19.852  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-16 04:19:19.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-16 04:19:19.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:19:19.855  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-16 04:19:19.856  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-16 04:19:19.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:19:19.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:19:19.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:19:19.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:19:19.860 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:19:19.860 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:19:19.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:19:19.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:19:19.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:19:19.865 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-16 04:19:19.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 17865632311015270959334926179901422084714704851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 16 03:03:42 UTC 2022 Final Date: Mon Mar 15 03:03:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:1e:09:08:61:59:77:51:29:13:d3:8a:60:b7:8c:c5:1e:fb:b2:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 142f485772d6241d077bc8ec034a6a9606933309 e3ecea6517014614ee8808a482ab449ad27bfdd6 99a34b10d6717af5a2af6ee88f542a5eb45462d0 d89b0c3162df17300048590e83253c57a34fbfba 95507b0c82c62b0cc5b162aeac413679620f2399 d376c6d9d869350b09ded4c61506ad4bb1e9086f a87761e2074c23b6c7d0f40baaa31848dfe229e2 1d02f05ffb6f58726b7e9b513a152e59da067494 8eeb14a3da581d409062884fb047c53cfd3d5c9e 1c19484630f5fda6b917fded7bfea8bb4f502278 075cd81027dd19fb58eca82bb3d0e6d79a3da7a6 e89a86c342c74872d1bf70282a7d6184dfad85ec 2af5f898c4e3f9013a442d7348b699f26e69d999 db5b07cb92c0b25b61ff34b3790b9441f597b0e6 652ee55ec130e8e6708fc3e75f9659ebfa11f28a 9dfd7c5d939faa7365d45c432be649d65517f8a0 d678188e74c6ae23ec3f8268e2b9462abd2d2eb2 89f2b3776965ad6cf7ebf1c5805b043fc3718d48 a43c68fe44690d8fee009fe0c676d07e86847631 ee02ee5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5d:44:e4:42:63:27:09:3b:7c:08:fd:dc:8e:ad:c5:9c:33:ae:09:ff] modulus: f0a31246e3e0718d428eae302c140b24a25d29da8c922dc66f6c858af74f4b904a5d14916ecea2c955eb058c64203cda5264041445f744ae2af523675082170375cb3787c974b64496aa6483726bcfae03b30cd8af1d6c350d1c9a513db3af1a4c7702318455ecb7f47418fd0e89ba21546afcc5c4b68b675ff03ac80782a98444cf327e9e9529571c10d9b80702427fa736ec624e4cef7ccdfe7289eb18c09df054df04faea6c4c6d998bc4d65906101c0490b3ff3644bf52a393072656928e4332ef273ccb7e6fe7841a6b0f0ed04cd0edef514f13e0704973e81be3dc875686e5906b576a8b88d505ea182c152a98c19106922e730b1a1eda490259f9a069 public exponent: 10001 ] 2022-03-16 04:21:09.324  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-16 04:21:09.325 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-16 04:21:09.327 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-16 04:21:09.327 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-16 04:21:09.328  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-16 04:21:09.328  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-16 04:21:09.329  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-16 04:21:09.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-16 04:21:09.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-16 04:21:09.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-16 04:21:09.336 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-16 04:21:09.337 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:21:09.337 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-16 04:21:09.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:21:09.525  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-16 04:21:09.528  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-16 04:21:09.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-16 04:21:09.529 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-16 04:21:09.531  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-16 04:21:09.531  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-16 04:21:09.532 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:21:09.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:21:09.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:21:09.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:21:09.535 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:21:09.536 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:21:09.537 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-16 04:21:09.537 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-16 04:21:09.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-16 04:21:09.539 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-16 04:21:09.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 17865632311015270959334926179901422084714704851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 16 03:03:42 UTC 2022 Final Date: Mon Mar 15 03:03:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4f:1e:09:08:61:59:77:51:29:13:d3:8a:60:b7:8c:c5:1e:fb:b2:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 142f485772d6241d077bc8ec034a6a9606933309 e3ecea6517014614ee8808a482ab449ad27bfdd6 99a34b10d6717af5a2af6ee88f542a5eb45462d0 d89b0c3162df17300048590e83253c57a34fbfba 95507b0c82c62b0cc5b162aeac413679620f2399 d376c6d9d869350b09ded4c61506ad4bb1e9086f a87761e2074c23b6c7d0f40baaa31848dfe229e2 1d02f05ffb6f58726b7e9b513a152e59da067494 8eeb14a3da581d409062884fb047c53cfd3d5c9e 1c19484630f5fda6b917fded7bfea8bb4f502278 075cd81027dd19fb58eca82bb3d0e6d79a3da7a6 e89a86c342c74872d1bf70282a7d6184dfad85ec 2af5f898c4e3f9013a442d7348b699f26e69d999 db5b07cb92c0b25b61ff34b3790b9441f597b0e6 652ee55ec130e8e6708fc3e75f9659ebfa11f28a 9dfd7c5d939faa7365d45c432be649d65517f8a0 d678188e74c6ae23ec3f8268e2b9462abd2d2eb2 89f2b3776965ad6cf7ebf1c5805b043fc3718d48 a43c68fe44690d8fee009fe0c676d07e86847631 ee02ee5b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:81:81:d4:7d:30:02:ef:a9:34:7a:ce:a1:29:d9:db:3b:33:42:32] modulus: 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 public exponent: 10001 ]