2022-03-23 02:56:17,370 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-23 02:56:19,491 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-23 02:56:20.611  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 23, 2022 2:56:23 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 23, 2022 2:56:23 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 23, 2022 2:56:23 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 23, 2022 2:56:24 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-23 02:56:24.970 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-23 02:56:25.443  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-23 02:56:25.712  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-23 02:56:27.265 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-23 02:56:27.272 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-23 02:56:27.275 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-23 02:56:27.283 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-23 02:56:27.382 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-23 02:56:27.390 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-03-23 02:56:27.608 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-23 02:56:28.728 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 23, 2022 2:56:29 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-23 02:56:30.247  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 14.084 seconds (JVM running for 16.771) Mar 23, 2022 2:56:44 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-23 02:57:04.245  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 02:57:04.254 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 02:57:04.304 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-23 02:57:04.317 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 02:57:04.376  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-23 02:57:04.380  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 02:57:04.381  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 02:57:04.383 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 02:57:04.384 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 02:57:04.395 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 02:57:04.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 02:57:04.418 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 02:57:04.479 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 02:57:04.487 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 02:57:04.487 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 02:57:04.493 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 02:57:05.178  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 02:57:05.181  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 02:57:05.182 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 02:57:05.186 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 02:57:05.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 02:57:05.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 02:57:05.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 02:57:05.202 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 02:57:05.202 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 02:57:05.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 02:57:05.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 02:57:05.228 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 02:57:05.240 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 02:57:05.241 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 02:57:05.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 02:57:05.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 02:57:05.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:b3:7b:a2:53:4d:bd:2c:c7:06:12:59:fc:6a:69:6c:05:29:d7:8a] modulus: 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 public exponent: 10001 ] 2022-03-23 03:58:20.452  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 03:58:20.455 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 03:58:20.459 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-23 03:58:20.460 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 03:58:20.461  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-23 03:58:20.461  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 03:58:20.462  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 03:58:20.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 03:58:20.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 03:58:20.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 03:58:20.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 03:58:20.472 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 03:58:20.472 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 03:58:20.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 03:58:20.682  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 03:58:20.683  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 03:58:20.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 03:58:20.684 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 03:58:20.690  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 03:58:20.692  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 03:58:20.693 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 03:58:20.693 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 03:58:20.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 03:58:20.698 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 03:58:20.699 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 03:58:20.699 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 03:58:20.700 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 03:58:20.701 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 03:58:20.701 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 03:58:20.703 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 03:58:20.715 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: eacf9d652f928d00e1552861f7739f5d0d7a6def22e9f05f6a479416a8656b5aa0508b90ab97ce1ddbcc8cdc6d2f7db000864e9e917f508b310140e32ed98585da99e7b89353383f3aace2acdeea1c4088df1f1968beaf887e82f3d64dcf9362db14a84e8f02b19d8cc14c2c5fb07a0de94657e6e38cad89244935b197acfe2bf0b68c8bd2ccb1f29de63f4a90e46406eabec9c550885d3b1e0f46b7139c3f2d0c376f9155778986883e5a198598eaa6629a7f1529c1813e491b80e10ec8a9c1d77b6aee3ec5e9ebe3db9a03218cf69d5bc1d21a5f0ae2251d768608f2fe251d4eaba05bdec5822bae0a75d56bf8ab2b72ec413de641f81ed0e7810a2b31b274b38b225d2610358f16adf39fe597ade5e4d9356d232d80846a5e403d072b6b3f067d5d2a17cdce940973c1e3f0ccf107bb20af3ce7ad96027cf49ed8b4b8bc8669aff15ca0f52acb8bee41bbceb908299cd0fac3e860160806fce35042b709809d62477f74235bb431b4a141ccb70f3c80da31a72d9905aedb832420c4f427c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:f2:18:48:2c:96:fc:78:42:e4:57:5c:93:2f:3e:a7:ba:ee:5f:8b] modulus: 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 public exponent: 10001 ] 2022-03-23 03:59:36.971  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 03:59:36.974 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 03:59:36.977 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-23 03:59:36.978 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 03:59:36.980  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-23 03:59:36.982  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 03:59:36.983  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 03:59:36.984 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 03:59:36.984 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 03:59:36.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 03:59:36.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 03:59:36.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 03:59:36.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 03:59:37.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 03:59:37.145  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 03:59:37.146  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 03:59:37.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 03:59:37.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 03:59:37.152  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 03:59:37.153  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 03:59:37.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 03:59:37.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 03:59:37.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 03:59:37.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 03:59:37.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 03:59:37.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 03:59:37.157 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 03:59:37.158 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 03:59:37.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 03:59:37.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 03:59:37.165 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:3c:71:2a:91:42:7c:0d:58:6c:79:84:d2:d8:79:dd:d6:8e:6e:a3] modulus: 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 public exponent: 10001 ] 2022-03-23 04:01:10.053  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:01:10.055 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:01:10.058 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-23 04:01:10.059 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:01:10.060  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-23 04:01:10.061  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:01:10.061  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:01:10.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:01:10.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:01:10.063 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:01:10.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:01:10.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:01:10.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:01:10.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:01:10.230  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:01:10.231  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:01:10.232 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:01:10.232 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:01:10.234  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:01:10.235  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:01:10.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:01:10.237 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:01:10.237 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:01:10.238 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:01:10.238 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:01:10.238 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:01:10.239 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:01:10.239 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:01:10.240 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:01:10.241 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:01:10.245 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [83:71:3d:b4:36:f2:fd:80:c9:02:f6:4a:2b:26:fe:db:f1:8d:37:62] modulus: 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 public exponent: 10001 ] 2022-03-23 04:02:25.831  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:02:25.832 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:02:25.834 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-23 04:02:25.835 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:02:25.836  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-23 04:02:25.837  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:02:25.837  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:02:25.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:02:25.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:02:25.839 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:02:25.846 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:02:25.847 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:02:25.847 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:02:25.848 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:02:26.015  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:02:26.017  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:02:26.018 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:02:26.018 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:02:26.020  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:02:26.021  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:02:26.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:02:26.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:02:26.023 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:02:26.024 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:02:26.024 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:02:26.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:02:26.026 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:02:26.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:02:26.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:02:26.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:02:26.036 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:ec:28:07:be:10:6c:f0:1b:ce:e6:07:e1:29:6f:c7:8b:78:62:06] modulus: c68ec5bf437b8b3ad4027692fa2ab51adb86847e44bdf057b8e2675999eae3fedc2af02cea328fb6ec54ecec067518acad13f50929e6133009c169e94cdd5283b52639d778fd61894c228eb53281fdcdf324a81b16d4af90e8096678dbe5ce9ad401a8e0dcbf1e0601949806d909b987ba46977e130207560af35d73931c7e85e2a1d28bf1e0c68b7f036965001a7ddbbdf78698b54f99cb7220e5b4209b1df90e263206c4e5780e393ea2258c9559529fc86390e4a3771bf70470b058cdeb383e0ce3837345ff117c5f23f544a06a19509478c92f5e6b7e240e98f3394f74c0a8a1d37fff4d2a6427981707c753b8e42b338a4b3653325f627e54ac14870c8f public exponent: 10001 ] 2022-03-23 04:02:58.731  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:02:58.733 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:02:58.735 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-23 04:02:58.736 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:02:58.737  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-23 04:02:58.738  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:02:58.739  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:02:58.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:02:58.741 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:02:58.742 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:02:58.751 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:02:58.753 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:02:58.753 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:02:58.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:02:58.908  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:02:58.910  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:02:58.910 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:02:58.910 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:02:58.919  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:02:58.923  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:02:58.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:02:58.928 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:02:58.930 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:02:58.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:02:58.936 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:02:58.936 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:02:58.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:02:58.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:02:58.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:02:58.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:02:58.950 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:38:3a:8f:54:22:ea:d0:7f:4c:c7:6a:36:37:6c:50:9f:f5:37:3a] modulus: 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 public exponent: 10001 ] 2022-03-23 04:03:02.364  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:03:02.366 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:03:02.367 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-23 04:03:02.368 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:03:02.368  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-23 04:03:02.369  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:03:02.370  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:03:02.370 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:03:02.370 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:03:02.371 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:03:02.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:03:02.376 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:03:02.377 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:03:02.377 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:03:02.481  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:03:02.482  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:03:02.482 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:03:02.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:03:02.485  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:03:02.486  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:03:02.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:03:02.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:03:02.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:03:02.488 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:03:02.489 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:03:02.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:03:02.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:03:02.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:03:02.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:03:02.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:03:02.500 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:25:b3:56:65:70:7e:1b:7f:c3:07:7f:e5:e8:83:3b:15:48:cb:1b] modulus: d99b4dce03b3cc3204a52b10e32398212f962c480f988a42a079bbeefb93e880546fdba8b4efe621dcb37bb03292b6cd1c01dac70e19d03401110b8c1768e9fb63f126ca6afae8ee621fd3d83e2ae73fa2b27d0ebdb99456669c59f308d2d5e3b773542dd4cdd8a0b894f3989e0427f410792f3fb924a50b1097bacdb549881ecdde0ea2701ed1f2c63084741d6c99d906fb3fb28618a7c4dc0e32778700ebb324b29e74489e0c56a451c1eb744ddaf4e55d4454ab7fa5d37243f1364e6ad5692cae2f1add53ebce8842578ef32ae4564dd86edc4a2dae5de44828c4d227112dbecc0e9bfc42babb306104e9221be1a15a8d10764921d2c098f7cf31a8424e5b public exponent: 10001 ] 2022-03-23 04:03:32.375  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:03:32.377 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:03:32.379 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-23 04:03:32.380 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:03:32.381  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-23 04:03:32.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:03:32.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:03:32.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:03:32.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:03:32.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:03:32.396 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:03:32.397 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:03:32.397 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:03:32.398 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:03:32.558  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:03:32.559  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:03:32.559 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:03:32.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:03:32.563  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:03:32.564  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:03:32.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:03:32.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:03:32.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:03:32.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:03:32.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:03:32.568 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:03:32.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:03:32.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:03:32.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:03:32.571 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:03:32.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:d4:32:cf:81:9a:ba:4b:72:ad:35:b8:5f:db:95:16:7b:7a:92:70] modulus: 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 public exponent: 10001 ] 2022-03-23 04:05:18.758  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:05:18.760 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:05:18.762 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-23 04:05:18.764 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:05:18.764  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-23 04:05:18.765  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:05:18.765  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:05:18.766 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:05:18.766 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:05:18.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:05:18.772 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:05:18.773 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:05:18.774 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:05:18.774 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:05:19.115  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:05:19.116  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:05:19.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:05:19.117 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:05:19.119  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:05:19.120  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:05:19.120 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:05:19.121 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:05:19.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:05:19.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:05:19.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:05:19.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:05:19.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:05:19.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:05:19.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:05:19.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:05:19.134 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:34:34:af:3f:d7:10:ae:41:69:b7:2f:68:7e:a9:86:36:9a:ad:3e] modulus: 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 public exponent: 10001 ] 2022-03-23 04:19:14.658  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:19:14.661 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:19:14.664 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-23 04:19:14.665 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:19:14.665  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-23 04:19:14.666  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:19:14.667  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:19:14.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:19:14.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:19:14.668 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:19:14.673 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:19:14.674 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:19:14.674 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:19:14.675 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:19:14.853  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:19:14.854  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:19:14.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:19:14.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:19:14.857  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:19:14.860  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:19:14.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:19:14.866 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:19:14.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:19:14.868 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:19:14.868 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:19:14.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:19:14.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:19:14.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:19:14.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:19:14.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:19:14.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:6f:32:ac:76:f5:fe:20:91:47:76:7b:7d:19:67:a9:15:2d:6e:f3] modulus: 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 public exponent: 10001 ] 2022-03-23 04:23:01.830  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:23:01.832 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:23:01.834 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-23 04:23:01.835 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:23:01.835  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-23 04:23:01.836  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:23:01.836  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:23:01.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:23:01.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:23:01.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:23:01.844 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:23:01.845 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:23:01.845 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:23:01.845 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:23:01.988  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:23:01.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:23:01.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:23:01.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:23:01.991  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:23:01.991  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:23:01.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:23:01.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:23:01.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:23:01.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:23:01.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:23:01.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:23:01.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:23:01.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:23:01.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:23:01.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:23:02.000 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:25:7d:49:f6:ed:5f:57:9f:20:c1:24:b4:2e:39:07:3e:32:b1:d8] modulus: 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 public exponent: 10001 ] 2022-03-23 04:23:36.370  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:23:36.372 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:23:36.374 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-23 04:23:36.375 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:23:36.375  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-23 04:23:36.376  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:23:36.376  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:23:36.376 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:23:36.377 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:23:36.377 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:23:36.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:23:36.388 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:23:36.388 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:23:36.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:23:36.515  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:23:36.517  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:23:36.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:23:36.519 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:23:36.522  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:23:36.523  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:23:36.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:23:36.525 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:23:36.525 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:23:36.527 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:23:36.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:23:36.529 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:23:36.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:23:36.534 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:23:36.534 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:23:36.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:23:36.542 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:4f:4e:23:24:ca:03:76:4b:cd:63:94:28:54:87:59:73:9a:f0:f0] modulus: c7d34a8a7751835c0ea9c868eb06acc7c6349cc98b74136fbf9dcbe8627ef07d646c161c7b942718a735d66c52a9a2bb7b8c38f8ca29f8deafb4c158a11c8d63ea7079bbe8632a94e07fb77ad225ae762cce64b71bbc3888f52993bd50cf97ec6285f1381e04454c139658943166b4e73db74c452b08bc5896980ba1f5760ecf4fa8c697c43ca67e68206e9f7993efaf1b58f1d05cc8f0e2d52cbd21643131196fd37af23a06536370439a75b9a68d884e88fe9abc802a14d686f302a1d9ee998af8fcbdaab64bc443a968ee7a777351315ec152806da78f91dc5942877802db43ddc6443a8d867fb71ad989c31293e963c884172e981471fcb93b92d6b2904d public exponent: 10001 ] 2022-03-23 04:24:08.884  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:24:08.885 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:24:08.887 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-23 04:24:08.888 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:24:08.888  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-23 04:24:08.889  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:24:08.889  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:24:08.889 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:24:08.890 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:24:08.890 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:24:08.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:24:08.896 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:24:08.896 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:24:08.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:24:08.996  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:24:08.997  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:24:08.997 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:24:08.998 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:24:09.000  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:24:09.001  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:24:09.001 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:24:09.002 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:24:09.002 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:24:09.003 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:24:09.003 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:24:09.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:24:09.005 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:24:09.005 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:24:09.005 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:24:09.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:24:09.011 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [16:ad:9f:d5:c0:cd:2b:9a:6c:be:4f:7a:17:a7:8b:60:d6:28:6b:d6] modulus: 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 public exponent: 10001 ] 2022-03-23 04:24:15.844  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:24:15.845 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:24:15.846 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-23 04:24:15.847 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:24:15.847  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-23 04:24:15.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:24:15.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:24:15.848 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:24:15.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:24:15.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:24:15.854 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:24:15.854 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:24:15.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:24:15.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:24:15.967  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:24:15.968  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:24:15.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:24:15.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:24:15.970  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:24:15.970  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:24:15.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:24:15.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:24:15.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:24:15.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:24:15.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:24:15.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:24:15.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:24:15.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:24:15.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:24:15.974 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:24:15.977 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:b5:9f:35:b9:bd:61:83:24:5f:21:5d:49:3a:5f:85:58:91:7f:e4] modulus: f7f3c71a09b91d8447a8014a7105151c2d1d2446d2e5812f4dfae013eeabb38429bdbd2b386352fa7845e9e762371b6a18b2f236085206890b3df6f4573b60a543227924667a02aa8ddd33927cc7752d018acfe930f7642be9720e89f3e9c70415569bca4eb4f21257eaf3d6d9990e6460c371c1f5fd5ad9976d0661ef6103fee34a8ed7282d813ba5fe2a41fb2b6603c815b209716688075b2cecdeb23e78a943c87258c39da29f22934c1ca0a0e8e5fbbd3e22699e420995673b864e12a495ff1bfca3b968b708f18030e2a37a26092f207d30a6358732869785da282c8aed09b2ade099e021fe2019de3426aedc6c48d44dd1eabf013f1d96163ec467d9d3 public exponent: 10001 ] 2022-03-23 04:25:55.303  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:25:55.304 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:25:55.306 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-23 04:25:55.307 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:25:55.308  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-23 04:25:55.308  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:25:55.309  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:25:55.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:25:55.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:25:55.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:25:55.318 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:25:55.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:25:55.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:25:55.319 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:25:55.456  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:25:55.457  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:25:55.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:25:55.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:25:55.458  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:25:55.458  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:25:55.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:25:55.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:25:55.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:25:55.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:25:55.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:25:55.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:25:55.461 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:25:55.461 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:25:55.461 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:25:55.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:25:55.473 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: eacf9d652f928d00e1552861f7739f5d0d7a6def22e9f05f6a479416a8656b5aa0508b90ab97ce1ddbcc8cdc6d2f7db000864e9e917f508b310140e32ed98585da99e7b89353383f3aace2acdeea1c4088df1f1968beaf887e82f3d64dcf9362db14a84e8f02b19d8cc14c2c5fb07a0de94657e6e38cad89244935b197acfe2bf0b68c8bd2ccb1f29de63f4a90e46406eabec9c550885d3b1e0f46b7139c3f2d0c376f9155778986883e5a198598eaa6629a7f1529c1813e491b80e10ec8a9c1d77b6aee3ec5e9ebe3db9a03218cf69d5bc1d21a5f0ae2251d768608f2fe251d4eaba05bdec5822bae0a75d56bf8ab2b72ec413de641f81ed0e7810a2b31b274b38b225d2610358f16adf39fe597ade5e4d9356d232d80846a5e403d072b6b3f067d5d2a17cdce940973c1e3f0ccf107bb20af3ce7ad96027cf49ed8b4b8bc8669aff15ca0f52acb8bee41bbceb908299cd0fac3e860160806fce35042b709809d62477f74235bb431b4a141ccb70f3c80da31a72d9905aedb832420c4f427c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:ed:82:b7:6f:38:2f:08:ea:46:87:93:34:96:75:eb:c5:0e:9a:56] modulus: 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 public exponent: 10001 ] 2022-03-23 04:30:07.174  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:30:07.175 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:30:07.177 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-23 04:30:07.177 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:30:07.178  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-23 04:30:07.178  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:30:07.179  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:30:07.179 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:30:07.179 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:30:07.180 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:30:07.184 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:30:07.185 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:30:07.185 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:30:07.185 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:30:07.337  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:30:07.338  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:30:07.338 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:30:07.338 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:30:07.339  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:30:07.340  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:30:07.340 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:30:07.340 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:30:07.340 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:30:07.341 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:30:07.341 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:30:07.341 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:30:07.342 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:30:07.342 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:30:07.342 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:30:07.343 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:30:07.347 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:c6:51:41:d8:6a:72:02:c6:d6:3c:38:c2:d5:9f:1c:21:5d:19:98] modulus: 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 public exponent: 10001 ] 2022-03-23 04:33:53.239  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:33:53.241 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:33:53.244 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-23 04:33:53.245 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:33:53.246  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-23 04:33:53.246  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:33:53.247  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:33:53.247 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:33:53.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:33:53.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:33:53.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:33:53.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:33:53.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:33:53.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:33:53.436  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:33:53.437  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:33:53.437 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:33:53.437 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:33:53.439  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:33:53.439  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:33:53.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:33:53.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:33:53.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:33:53.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:33:53.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:33:53.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:33:53.442 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:33:53.442 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:33:53.442 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:33:53.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:33:53.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:64:0a:f5:e5:37:b0:3b:64:66:eb:77:53:12:5e:0f:9c:fb:b9:5a] modulus: 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 public exponent: 10001 ] 2022-03-23 04:34:26.665  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:34:26.666 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:34:26.667 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-23 04:34:26.668 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:34:26.668  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-23 04:34:26.669  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:34:26.669  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:34:26.669 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:34:26.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:34:26.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:34:26.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:34:26.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:34:26.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:34:26.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:34:26.819  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:34:26.820  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:34:26.820 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:34:26.821 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:34:26.822  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:34:26.822  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:34:26.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:34:26.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:34:26.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:34:26.824 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:34:26.824 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:34:26.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:34:26.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:34:26.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:34:26.827 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:34:26.828 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:34:26.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: eacf9d652f928d00e1552861f7739f5d0d7a6def22e9f05f6a479416a8656b5aa0508b90ab97ce1ddbcc8cdc6d2f7db000864e9e917f508b310140e32ed98585da99e7b89353383f3aace2acdeea1c4088df1f1968beaf887e82f3d64dcf9362db14a84e8f02b19d8cc14c2c5fb07a0de94657e6e38cad89244935b197acfe2bf0b68c8bd2ccb1f29de63f4a90e46406eabec9c550885d3b1e0f46b7139c3f2d0c376f9155778986883e5a198598eaa6629a7f1529c1813e491b80e10ec8a9c1d77b6aee3ec5e9ebe3db9a03218cf69d5bc1d21a5f0ae2251d768608f2fe251d4eaba05bdec5822bae0a75d56bf8ab2b72ec413de641f81ed0e7810a2b31b274b38b225d2610358f16adf39fe597ade5e4d9356d232d80846a5e403d072b6b3f067d5d2a17cdce940973c1e3f0ccf107bb20af3ce7ad96027cf49ed8b4b8bc8669aff15ca0f52acb8bee41bbceb908299cd0fac3e860160806fce35042b709809d62477f74235bb431b4a141ccb70f3c80da31a72d9905aedb832420c4f427c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:a4:8b:df:f6:26:51:9a:b7:b2:e2:3d:80:9c:74:9b:39:11:72:1e] modulus: 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 public exponent: 10001 ] 2022-03-23 04:34:58.831  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-23 04:34:58.832 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-23 04:34:58.834 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-23 04:34:58.835 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-23 04:34:58.835  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-23 04:34:58.836  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-23 04:34:58.836  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-23 04:34:58.837 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-23 04:34:58.837 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-23 04:34:58.837 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-23 04:34:58.842 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-23 04:34:58.843 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:34:58.843 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-23 04:34:58.844 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:34:58.993  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-23 04:34:58.994  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-23 04:34:58.994 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-23 04:34:58.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-23 04:34:58.998  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-23 04:34:58.999  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-23 04:34:58.999 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:34:59.000 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:34:59.000 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:34:59.001 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:34:59.002 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:34:59.002 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:34:59.003 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-23 04:34:59.004 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-23 04:34:59.004 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-23 04:34:59.005 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-23 04:34:59.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 499887782149408794944983970714766388353646351505 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Mar 23 02:53:56 UTC 2022 Final Date: Mon Mar 22 02:53:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f1:2b:58:61:2f:6e:2f:a7:66:c2:ed:f2:a9:79:ca:64:82:e5:ce:a7] modulus: eacf9d652f928d00e1552861f7739f5d0d7a6def22e9f05f6a479416a8656b5aa0508b90ab97ce1ddbcc8cdc6d2f7db000864e9e917f508b310140e32ed98585da99e7b89353383f3aace2acdeea1c4088df1f1968beaf887e82f3d64dcf9362db14a84e8f02b19d8cc14c2c5fb07a0de94657e6e38cad89244935b197acfe2bf0b68c8bd2ccb1f29de63f4a90e46406eabec9c550885d3b1e0f46b7139c3f2d0c376f9155778986883e5a198598eaa6629a7f1529c1813e491b80e10ec8a9c1d77b6aee3ec5e9ebe3db9a03218cf69d5bc1d21a5f0ae2251d768608f2fe251d4eaba05bdec5822bae0a75d56bf8ab2b72ec413de641f81ed0e7810a2b31b274b38b225d2610358f16adf39fe597ade5e4d9356d232d80846a5e403d072b6b3f067d5d2a17cdce940973c1e3f0ccf107bb20af3ce7ad96027cf49ed8b4b8bc8669aff15ca0f52acb8bee41bbceb908299cd0fac3e860160806fce35042b709809d62477f74235bb431b4a141ccb70f3c80da31a72d9905aedb832420c4f427c9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: e9a6cae9ec368aae4538ea50915ab4a3982558d1 e55cc4baa4b6900003c28f275dc442fa7134d18f 3653f3430aee0e80dd3a56584047a6a3623ddeda 5942cf28110bc9fa421feaefc16965a2156e4bcd 1531b545a46588092f22602dc0530f134aca956f 0006f9e1f53b85fef8975faa088f76a424bf9323 2ed44967a4b4c6bed0e00fe29ee912b7cc9bbacd ff6c2627e8490ec06aa0f5f23b359455138b91b3 35aa2cebf69f69c3656c4d3684cb6201347e59b5 0bac8814ed5cffa8c3feccb97d71026bc7cd7c90 dae23cd6dadfb871b3941206da2f0ce8dc991c56 bf503c31e8c0b28a2e337b89a1843d1c82b6e8e4 f3663dd5c9290f330349bb863c604645a8f8b331 78570aea2669d96c6f8e4df5e73cd6923db5d873 3d119155a2c600a2c82707d191c42cd204a2df7e 47ac08b2d0eef65abd2576ca5f6c944d19a227b7 af5c1b4908afe349011e554de87e88576acddbd4 4e32f733aef47d01b123b1962cc8e0faeb307301 ad0072885e86ad191c7b2fc5be7f7f69fd9305b6 744236d4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:27:ca:79:69:a9:2d:41:35:c4:0f:f8:26:4a:cb:e7:10:b4:a0:a2] modulus: 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 public exponent: 10001 ]