2022-03-26 03:16:03,133 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-26 03:16:05,389 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-26 03:16:06.568  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 26, 2022 3:16:09 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 26, 2022 3:16:09 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 26, 2022 3:16:09 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 26, 2022 3:16:09 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-26 03:16:10.529 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-26 03:16:10.952  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-26 03:16:11.226  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-26 03:16:12.303 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-26 03:16:12.308 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-26 03:16:12.311 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-26 03:16:12.319 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-26 03:16:12.378 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-03-26 03:16:12.383 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-03-26 03:16:12.588 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-26 03:16:13.415 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 26, 2022 3:16:14 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-26 03:16:14.797  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 13.433 seconds (JVM running for 40.409) Mar 26, 2022 3:16:16 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-26 03:59:50.870  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-26 03:59:50.897 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-26 03:59:50.965 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-26 03:59:50.976 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-26 03:59:51.015  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-26 03:59:51.019  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-26 03:59:51.020  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-26 03:59:51.021 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-26 03:59:51.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 03:59:51.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-26 03:59:51.042 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-26 03:59:51.049 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-26 03:59:51.105 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-26 03:59:51.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 03:59:51.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 03:59:51.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 03:59:52.050  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-26 03:59:52.054  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-26 03:59:52.055 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-26 03:59:52.057 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 03:59:52.070  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-26 03:59:52.072  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-26 03:59:52.072 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 03:59:52.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 03:59:52.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 03:59:52.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 03:59:52.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 03:59:52.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 03:59:52.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 03:59:52.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 03:59:52.132 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 03:59:52.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-26 03:59:52.178 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585143979963141440240027930959010116441012072851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 26 02:54:53 UTC 2022 Final Date: Thu Mar 25 02:54:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:be:3e:e5:f0:40:67:9d:8b:a4:79:ca:6f:31:54:8f:b9:e7:c5:8d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1d418827891d810221e5afed21af83f7fe4b200c a5fe832221bd16a8ecbb4b4efd67f1f6dfc0ec42 717b36323dd2d511b7c8b1afc755d3f45c385f6d b6378efd4c801ca0eb4d55c983f094b4a6606b50 c55dfd712fbaccfb51a80a6884724ad482d407db a2df2c8af5cd75dbc81a5cb9344685aa1adc516e 7813bd49b172fe28eeab598b46a2d3b6f7f44cb1 afd5d58f351ec5b4fd05ea08916d965c472267cc bc012ad8841293c4916ac31b42071b0297b40665 566b771755b11a111890d51e8c81f352a2b470a2 70b78fe0e68694cfa18b4ed4cb8ca4abb7da70a6 3f7a70e296cb6f8bff9ce9b8a2675dc02508887d 79bbf518ee6eacbd86ce40ff6087354535873ad8 88ae76e59c5d82bfc2aa665dcbe44f25a0d7a448 955256db3916b07d125de27b0cb54958564c8d18 6c644890e34d80ec0a2aa9c0b185830980a9f4bb 4a3c683be2476bd9a5c5e4c8c17e77ad240df951 4fa0157d63b231a815d51cb9b345f439463215d1 b794efdfe8bd7c02eec1e776ed0cd06ba7fcab20 3fab6d13 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:e0:33:73:4e:99:78:0c:be:52:10:20:d5:44:b8:a0:5f:a2:3c:58] modulus: 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 public exponent: 10001 ] 2022-03-26 04:01:12.351  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-26 04:01:12.355 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-26 04:01:12.359 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-26 04:01:12.360 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-26 04:01:12.362  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-26 04:01:12.363  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-26 04:01:12.364  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-26 04:01:12.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-26 04:01:12.369 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-26 04:01:12.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-26 04:01:12.390 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-26 04:01:12.392 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:01:12.393 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:01:12.394 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:01:12.600  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-26 04:01:12.602  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-26 04:01:12.603 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-26 04:01:12.603 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:01:12.608  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-26 04:01:12.609  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-26 04:01:12.610 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:01:12.610 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:01:12.611 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:01:12.613 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:01:12.614 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:01:12.615 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:01:12.625 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:01:12.626 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:01:12.626 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:01:12.632 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-26 04:01:12.653 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585143979963141440240027930959010116441012072851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 26 02:54:53 UTC 2022 Final Date: Thu Mar 25 02:54:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:be:3e:e5:f0:40:67:9d:8b:a4:79:ca:6f:31:54:8f:b9:e7:c5:8d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1d418827891d810221e5afed21af83f7fe4b200c a5fe832221bd16a8ecbb4b4efd67f1f6dfc0ec42 717b36323dd2d511b7c8b1afc755d3f45c385f6d b6378efd4c801ca0eb4d55c983f094b4a6606b50 c55dfd712fbaccfb51a80a6884724ad482d407db a2df2c8af5cd75dbc81a5cb9344685aa1adc516e 7813bd49b172fe28eeab598b46a2d3b6f7f44cb1 afd5d58f351ec5b4fd05ea08916d965c472267cc bc012ad8841293c4916ac31b42071b0297b40665 566b771755b11a111890d51e8c81f352a2b470a2 70b78fe0e68694cfa18b4ed4cb8ca4abb7da70a6 3f7a70e296cb6f8bff9ce9b8a2675dc02508887d 79bbf518ee6eacbd86ce40ff6087354535873ad8 88ae76e59c5d82bfc2aa665dcbe44f25a0d7a448 955256db3916b07d125de27b0cb54958564c8d18 6c644890e34d80ec0a2aa9c0b185830980a9f4bb 4a3c683be2476bd9a5c5e4c8c17e77ad240df951 4fa0157d63b231a815d51cb9b345f439463215d1 b794efdfe8bd7c02eec1e776ed0cd06ba7fcab20 3fab6d13 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:82:81:6b:a8:b3:91:32:bf:e5:71:e1:19:b5:44:b0:4a:de:46:1f] modulus: e9f6b44574ba991f786920667ab2d15e301d18c9c88c38b7fd9ff22bbd98bb0a9f6fd5c824207be23aec0fd4b3953041d2c00df476c47fed8a4308837add433c95d12da76e5953426bbd59ab42b0d4a588ca2ae8c2529531cae852a45a10f1c294b8bae070671596954f235a9556ed3d0ef7c25087648316ae4747bb84fd0cbdf0dfd14d993a3fb61d95f7171721c8d862edebeab738aa25f9585992c18c4c7ae1932005e848d97de01e67e29364a1d3ae6f755f3fb4ae015e04f7960cb7f93659bb4d81da07271201f237d9d8cf2a04b77af9691fcc48c6fc300a1cc18c089294bcd068d4775566ef51f6be586201f953dc9230446daee960df9f2a0f76377b public exponent: 10001 ] 2022-03-26 04:02:28.361  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-26 04:02:28.363 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-26 04:02:28.366 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-26 04:02:28.367 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-26 04:02:28.368  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-26 04:02:28.369  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-26 04:02:28.370  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-26 04:02:28.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-26 04:02:28.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-26 04:02:28.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-26 04:02:28.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-26 04:02:28.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:02:28.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:02:28.385 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:02:28.635  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-26 04:02:28.637  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-26 04:02:28.637 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-26 04:02:28.638 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:02:28.640  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-26 04:02:28.640  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-26 04:02:28.641 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:02:28.641 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:02:28.641 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:02:28.643 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:02:28.643 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:02:28.644 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:02:28.645 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:02:28.645 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:02:28.646 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:02:28.647 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-26 04:02:28.653 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585143979963141440240027930959010116441012072851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 26 02:54:53 UTC 2022 Final Date: Thu Mar 25 02:54:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:be:3e:e5:f0:40:67:9d:8b:a4:79:ca:6f:31:54:8f:b9:e7:c5:8d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1d418827891d810221e5afed21af83f7fe4b200c a5fe832221bd16a8ecbb4b4efd67f1f6dfc0ec42 717b36323dd2d511b7c8b1afc755d3f45c385f6d b6378efd4c801ca0eb4d55c983f094b4a6606b50 c55dfd712fbaccfb51a80a6884724ad482d407db a2df2c8af5cd75dbc81a5cb9344685aa1adc516e 7813bd49b172fe28eeab598b46a2d3b6f7f44cb1 afd5d58f351ec5b4fd05ea08916d965c472267cc bc012ad8841293c4916ac31b42071b0297b40665 566b771755b11a111890d51e8c81f352a2b470a2 70b78fe0e68694cfa18b4ed4cb8ca4abb7da70a6 3f7a70e296cb6f8bff9ce9b8a2675dc02508887d 79bbf518ee6eacbd86ce40ff6087354535873ad8 88ae76e59c5d82bfc2aa665dcbe44f25a0d7a448 955256db3916b07d125de27b0cb54958564c8d18 6c644890e34d80ec0a2aa9c0b185830980a9f4bb 4a3c683be2476bd9a5c5e4c8c17e77ad240df951 4fa0157d63b231a815d51cb9b345f439463215d1 b794efdfe8bd7c02eec1e776ed0cd06ba7fcab20 3fab6d13 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:c3:4c:9b:66:f7:81:26:70:22:44:59:d7:85:56:e7:25:8d:33:25] modulus: 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 public exponent: 10001 ] 2022-03-26 04:04:18.491  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-26 04:04:18.493 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-26 04:04:18.497 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-26 04:04:18.499 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-26 04:04:18.500  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-26 04:04:18.503  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-26 04:04:18.503  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-26 04:04:18.504 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-26 04:04:18.504 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-26 04:04:18.524 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-26 04:04:18.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-26 04:04:18.534 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:04:18.536 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:04:18.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:04:18.801  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-26 04:04:18.802  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-26 04:04:18.803 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-26 04:04:18.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:04:18.807  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-26 04:04:18.808  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-26 04:04:18.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:04:18.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:04:18.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:04:18.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:04:18.812 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:04:18.812 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:04:18.814 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:04:18.814 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:04:18.815 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:04:18.816 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-26 04:04:18.822 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585143979963141440240027930959010116441012072851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 26 02:54:53 UTC 2022 Final Date: Thu Mar 25 02:54:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:be:3e:e5:f0:40:67:9d:8b:a4:79:ca:6f:31:54:8f:b9:e7:c5:8d] modulus: c0e5f6a51373b1efc837b0dc4e7b54275f6cb8445416470a1808791f113dc0c8e37504ad265bf1fd890df8c7693e1aa38752b7b9b3b33843620ea81106f5b85edeb3697fb544fcf4e2efb60e05171d669f0c9ae52647d3c38fca9fc0af580886a9e92859ed6730e5046e6d874f57133828df31f130a09c08cc35399f6cbfea54e69ca2b652a3c6854fd2c85d380ec9bfbf54f6269380b831bdc8dd4d534df0d113436636bfddb549245df5d68be67f493c1cfe981e215f64d94b144088ef277d726864b4fcd9070d4399cd43f4b9be8fa394e58cdfbcb22fc8711fd777c6c4200251813ce7706142a3ef92b866f0d6f9f70ae492f298062126706e458ac93b98abdb9ef33abc5b25dec6f62547cae20fd6e998f3218b0269c7bad8e71ec984ca79a36d6b67caf08d80ecbf4cfb0c6a4116b2a75764b7c75acdc4e72757bc4d34b7e84ae66403e149c0bda759ed48b1d655342cd74807fdd7b4fe20e39c06ce273c6aaa54ec4ae544b56d9bffb563577eeddead8d5a8282dc9b866f29900c5213 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1d418827891d810221e5afed21af83f7fe4b200c a5fe832221bd16a8ecbb4b4efd67f1f6dfc0ec42 717b36323dd2d511b7c8b1afc755d3f45c385f6d b6378efd4c801ca0eb4d55c983f094b4a6606b50 c55dfd712fbaccfb51a80a6884724ad482d407db a2df2c8af5cd75dbc81a5cb9344685aa1adc516e 7813bd49b172fe28eeab598b46a2d3b6f7f44cb1 afd5d58f351ec5b4fd05ea08916d965c472267cc bc012ad8841293c4916ac31b42071b0297b40665 566b771755b11a111890d51e8c81f352a2b470a2 70b78fe0e68694cfa18b4ed4cb8ca4abb7da70a6 3f7a70e296cb6f8bff9ce9b8a2675dc02508887d 79bbf518ee6eacbd86ce40ff6087354535873ad8 88ae76e59c5d82bfc2aa665dcbe44f25a0d7a448 955256db3916b07d125de27b0cb54958564c8d18 6c644890e34d80ec0a2aa9c0b185830980a9f4bb 4a3c683be2476bd9a5c5e4c8c17e77ad240df951 4fa0157d63b231a815d51cb9b345f439463215d1 b794efdfe8bd7c02eec1e776ed0cd06ba7fcab20 3fab6d13 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:34:0b:47:9d:7c:9d:2a:f0:99:8b:3a:3e:82:d0:af:73:ef:05:ec] modulus: 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 public exponent: 10001 ] 2022-03-26 04:04:38.633  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-26 04:04:38.635 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-26 04:04:38.637 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-26 04:04:38.638 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-26 04:04:38.639  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-26 04:04:38.641  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-26 04:04:38.641  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-26 04:04:38.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-26 04:04:38.643 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-26 04:04:38.643 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-26 04:04:38.651 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-26 04:04:38.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:04:38.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:04:38.654 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:04:38.836  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-26 04:04:38.839  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-26 04:04:38.840 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-26 04:04:38.841 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:04:38.844  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-26 04:04:38.846  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-26 04:04:38.846 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:04:38.847 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:04:38.847 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:04:38.849 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:04:38.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:04:38.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:04:38.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:04:38.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:04:38.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:04:38.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-26 04:04:38.861 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585143979963141440240027930959010116441012072851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 26 02:54:53 UTC 2022 Final Date: Thu Mar 25 02:54:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:be:3e:e5:f0:40:67:9d:8b:a4:79:ca:6f:31:54:8f:b9:e7:c5:8d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1d418827891d810221e5afed21af83f7fe4b200c a5fe832221bd16a8ecbb4b4efd67f1f6dfc0ec42 717b36323dd2d511b7c8b1afc755d3f45c385f6d b6378efd4c801ca0eb4d55c983f094b4a6606b50 c55dfd712fbaccfb51a80a6884724ad482d407db a2df2c8af5cd75dbc81a5cb9344685aa1adc516e 7813bd49b172fe28eeab598b46a2d3b6f7f44cb1 afd5d58f351ec5b4fd05ea08916d965c472267cc bc012ad8841293c4916ac31b42071b0297b40665 566b771755b11a111890d51e8c81f352a2b470a2 70b78fe0e68694cfa18b4ed4cb8ca4abb7da70a6 3f7a70e296cb6f8bff9ce9b8a2675dc02508887d 79bbf518ee6eacbd86ce40ff6087354535873ad8 88ae76e59c5d82bfc2aa665dcbe44f25a0d7a448 955256db3916b07d125de27b0cb54958564c8d18 6c644890e34d80ec0a2aa9c0b185830980a9f4bb 4a3c683be2476bd9a5c5e4c8c17e77ad240df951 4fa0157d63b231a815d51cb9b345f439463215d1 b794efdfe8bd7c02eec1e776ed0cd06ba7fcab20 3fab6d13 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:e4:3f:85:d7:eb:c2:d0:76:78:66:88:35:36:d0:c1:2d:70:14:6d] modulus: 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 public exponent: 10001 ] 2022-03-26 04:05:12.749  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-26 04:05:12.752 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-26 04:05:12.755 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-26 04:05:12.757 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-26 04:05:12.757  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-26 04:05:12.759  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-26 04:05:12.761  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-26 04:05:12.761 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-26 04:05:12.762 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-26 04:05:12.763 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-26 04:05:12.772 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-26 04:05:12.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:05:12.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:05:12.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:05:12.949  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-26 04:05:12.950  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-26 04:05:12.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-26 04:05:12.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:05:12.953  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-26 04:05:12.954  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-26 04:05:12.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:05:12.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:05:12.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:05:12.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:05:12.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:05:12.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:05:12.959 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:05:12.959 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:05:12.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:05:12.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-26 04:05:12.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585143979963141440240027930959010116441012072851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 26 02:54:53 UTC 2022 Final Date: Thu Mar 25 02:54:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:be:3e:e5:f0:40:67:9d:8b:a4:79:ca:6f:31:54:8f:b9:e7:c5:8d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1d418827891d810221e5afed21af83f7fe4b200c a5fe832221bd16a8ecbb4b4efd67f1f6dfc0ec42 717b36323dd2d511b7c8b1afc755d3f45c385f6d b6378efd4c801ca0eb4d55c983f094b4a6606b50 c55dfd712fbaccfb51a80a6884724ad482d407db a2df2c8af5cd75dbc81a5cb9344685aa1adc516e 7813bd49b172fe28eeab598b46a2d3b6f7f44cb1 afd5d58f351ec5b4fd05ea08916d965c472267cc bc012ad8841293c4916ac31b42071b0297b40665 566b771755b11a111890d51e8c81f352a2b470a2 70b78fe0e68694cfa18b4ed4cb8ca4abb7da70a6 3f7a70e296cb6f8bff9ce9b8a2675dc02508887d 79bbf518ee6eacbd86ce40ff6087354535873ad8 88ae76e59c5d82bfc2aa665dcbe44f25a0d7a448 955256db3916b07d125de27b0cb54958564c8d18 6c644890e34d80ec0a2aa9c0b185830980a9f4bb 4a3c683be2476bd9a5c5e4c8c17e77ad240df951 4fa0157d63b231a815d51cb9b345f439463215d1 b794efdfe8bd7c02eec1e776ed0cd06ba7fcab20 3fab6d13 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:d5:12:cd:57:9c:a4:10:46:d7:39:57:88:42:60:a8:0f:6b:d8:8e] modulus: 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 public exponent: 10001 ] 2022-03-26 04:05:45.751  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-26 04:05:45.753 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-26 04:05:45.763 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-26 04:05:45.765 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-26 04:05:45.765  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-26 04:05:45.767  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-26 04:05:45.767  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-26 04:05:45.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-26 04:05:45.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-26 04:05:45.771 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-26 04:05:45.780 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-26 04:05:45.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:05:45.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:05:45.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:05:45.951  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-26 04:05:45.952  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-26 04:05:45.952 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-26 04:05:45.953 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:05:45.957  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-26 04:05:45.958  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-26 04:05:45.958 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:05:45.959 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:05:45.959 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:05:45.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:05:45.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:05:45.961 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:05:45.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:05:45.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:05:45.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:05:45.964 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-26 04:05:45.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585143979963141440240027930959010116441012072851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 26 02:54:53 UTC 2022 Final Date: Thu Mar 25 02:54:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:be:3e:e5:f0:40:67:9d:8b:a4:79:ca:6f:31:54:8f:b9:e7:c5:8d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1d418827891d810221e5afed21af83f7fe4b200c a5fe832221bd16a8ecbb4b4efd67f1f6dfc0ec42 717b36323dd2d511b7c8b1afc755d3f45c385f6d b6378efd4c801ca0eb4d55c983f094b4a6606b50 c55dfd712fbaccfb51a80a6884724ad482d407db a2df2c8af5cd75dbc81a5cb9344685aa1adc516e 7813bd49b172fe28eeab598b46a2d3b6f7f44cb1 afd5d58f351ec5b4fd05ea08916d965c472267cc bc012ad8841293c4916ac31b42071b0297b40665 566b771755b11a111890d51e8c81f352a2b470a2 70b78fe0e68694cfa18b4ed4cb8ca4abb7da70a6 3f7a70e296cb6f8bff9ce9b8a2675dc02508887d 79bbf518ee6eacbd86ce40ff6087354535873ad8 88ae76e59c5d82bfc2aa665dcbe44f25a0d7a448 955256db3916b07d125de27b0cb54958564c8d18 6c644890e34d80ec0a2aa9c0b185830980a9f4bb 4a3c683be2476bd9a5c5e4c8c17e77ad240df951 4fa0157d63b231a815d51cb9b345f439463215d1 b794efdfe8bd7c02eec1e776ed0cd06ba7fcab20 3fab6d13 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:c0:25:f6:c3:b5:b6:01:0c:b9:23:4a:ab:ef:d2:b0:a6:74:c0:05] modulus: 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 public exponent: 10001 ] 2022-03-26 04:07:32.608  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-26 04:07:32.610 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-26 04:07:32.613 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-26 04:07:32.614 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-26 04:07:32.615  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-26 04:07:32.616  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-26 04:07:32.616  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-26 04:07:32.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-26 04:07:32.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-26 04:07:32.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-26 04:07:32.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-26 04:07:32.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:07:32.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-26 04:07:32.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:07:32.809  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-26 04:07:32.810  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-26 04:07:32.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-26 04:07:32.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-26 04:07:32.813  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-26 04:07:32.813  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-26 04:07:32.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:07:32.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:07:32.815 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:07:32.815 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:07:32.816 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:07:32.816 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:07:32.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-26 04:07:32.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-26 04:07:32.817 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-26 04:07:32.818 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-26 04:07:32.824 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 585143979963141440240027930959010116441012072851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Mar 26 02:54:53 UTC 2022 Final Date: Thu Mar 25 02:54:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:be:3e:e5:f0:40:67:9d:8b:a4:79:ca:6f:31:54:8f:b9:e7:c5:8d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1d418827891d810221e5afed21af83f7fe4b200c a5fe832221bd16a8ecbb4b4efd67f1f6dfc0ec42 717b36323dd2d511b7c8b1afc755d3f45c385f6d b6378efd4c801ca0eb4d55c983f094b4a6606b50 c55dfd712fbaccfb51a80a6884724ad482d407db a2df2c8af5cd75dbc81a5cb9344685aa1adc516e 7813bd49b172fe28eeab598b46a2d3b6f7f44cb1 afd5d58f351ec5b4fd05ea08916d965c472267cc bc012ad8841293c4916ac31b42071b0297b40665 566b771755b11a111890d51e8c81f352a2b470a2 70b78fe0e68694cfa18b4ed4cb8ca4abb7da70a6 3f7a70e296cb6f8bff9ce9b8a2675dc02508887d 79bbf518ee6eacbd86ce40ff6087354535873ad8 88ae76e59c5d82bfc2aa665dcbe44f25a0d7a448 955256db3916b07d125de27b0cb54958564c8d18 6c644890e34d80ec0a2aa9c0b185830980a9f4bb 4a3c683be2476bd9a5c5e4c8c17e77ad240df951 4fa0157d63b231a815d51cb9b345f439463215d1 b794efdfe8bd7c02eec1e776ed0cd06ba7fcab20 3fab6d13 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:5f:2e:00:d8:85:af:4f:67:a5:2a:a9:b7:89:ae:ef:3d:db:a1:ec] modulus: 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 public exponent: 10001 ]