2022-03-27 03:01:00,378 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-27 03:01:01,992 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-27 03:01:02.912  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 27, 2022 3:01:05 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 27, 2022 3:01:05 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 27, 2022 3:01:05 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 27, 2022 3:01:05 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-27 03:01:07.084 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-27 03:01:07.576  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-27 03:01:07.825  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-27 03:01:08.939 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-27 03:01:08.946 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-27 03:01:08.949 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-27 03:01:08.958 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-27 03:01:09.002 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-27 03:01:09.007 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-27 03:01:09.187 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-27 03:01:09.987 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 27, 2022 3:01:10 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-27 03:01:11.421  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 12.324 seconds (JVM running for 14.903) Mar 27, 2022 3:01:29 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-27 03:01:57.943  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-27 03:01:57.958 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-27 03:01:58.020 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-27 03:01:58.032 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-27 03:01:58.078  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-27 03:01:58.092  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-27 03:01:58.095  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-27 03:01:58.098 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-27 03:01:58.098 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 03:01:58.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-27 03:01:58.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-27 03:01:58.128 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-27 03:01:58.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-27 03:01:58.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 03:01:58.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 03:01:58.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 03:01:58.952  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-27 03:01:58.957  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-27 03:01:58.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-27 03:01:58.961 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 03:01:58.978  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-27 03:01:58.980  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-27 03:01:58.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 03:01:58.983 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 03:01:58.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 03:01:59.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 03:01:59.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 03:01:59.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 03:01:59.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 03:01:59.023 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 03:01:59.023 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 03:01:59.032 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-27 03:01:59.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 371923607047146273461788755309512421727828222502 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 27 02:58:20 UTC 2022 Final Date: Fri Mar 26 02:58:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6e:30:ae:07:7c:31:1e:8f:c4:d9:04:a0:49:62:47:a9:e3:f7:0d:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d85b942e62059258b2385fc3a2d7583c79a0916 6b42c66d6bad9c8d0515603a6497f17f8317cbaf c8154694b3f0d66d97847b46bce9ff477324d60c 3710b40b1508894ae0db6695598b775286b28135 98cfacb6e7f18cb4ee61f344d616d9f7aeb80083 e851267d873eec504c7f3cac717ba4913b2bd181 75752ca945d8ff9f55e497f6d812977913d87386 079edce2bcfd13696846a7bf2369d49b5071f6e2 1c2de9c8902f9a4d3158803c6a088a0d6acced98 26e94aa607bd6927f0067c8c93c7ed9dbca6e476 761bd554eca808a6d1a9c22f4248ea8ca196837f 24f45d063c1d0b30cca8cf5760afc0beae5ebaf0 92ae17e5dd833437b12a1dac20e914ec4e2d3543 2fa7b4a364d6ea2fc062c1e7ba6b525fe4a18e77 23c9a886b1b6a0baafa4d502998833f9e50bc741 cfa751bd8c6c305be378b7f42c8477ccb0d70f7a 925bb6d67eb6c04e8b3870ec338bf112079dd2cd 4edbec8275057e096b40aeb42e5e4f9a51f63b9a 559b4ec5cc995530175f6cdeccdddcddf3df4a5b e83abd4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:8c:0d:9d:5f:d9:0f:e0:81:d3:07:e3:4c:d2:7d:9f:6d:3b:30:6d] modulus: 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 public exponent: 10001 ] 2022-03-27 04:05:30.751  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-27 04:05:30.759 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-27 04:05:30.767 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-27 04:05:30.772 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-27 04:05:30.774  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-27 04:05:30.777  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-27 04:05:30.780  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-27 04:05:30.781 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-27 04:05:30.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-27 04:05:30.784 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-27 04:05:30.806 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-27 04:05:30.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:05:30.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:05:30.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:05:31.033  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-27 04:05:31.034  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-27 04:05:31.034 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-27 04:05:31.035 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:05:31.038  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-27 04:05:31.038  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-27 04:05:31.039 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:05:31.039 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:05:31.040 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:05:31.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:05:31.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:05:31.041 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:05:31.043 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:05:31.043 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:05:31.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:05:31.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-27 04:05:31.050 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 371923607047146273461788755309512421727828222502 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 27 02:58:20 UTC 2022 Final Date: Fri Mar 26 02:58:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6e:30:ae:07:7c:31:1e:8f:c4:d9:04:a0:49:62:47:a9:e3:f7:0d:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d85b942e62059258b2385fc3a2d7583c79a0916 6b42c66d6bad9c8d0515603a6497f17f8317cbaf c8154694b3f0d66d97847b46bce9ff477324d60c 3710b40b1508894ae0db6695598b775286b28135 98cfacb6e7f18cb4ee61f344d616d9f7aeb80083 e851267d873eec504c7f3cac717ba4913b2bd181 75752ca945d8ff9f55e497f6d812977913d87386 079edce2bcfd13696846a7bf2369d49b5071f6e2 1c2de9c8902f9a4d3158803c6a088a0d6acced98 26e94aa607bd6927f0067c8c93c7ed9dbca6e476 761bd554eca808a6d1a9c22f4248ea8ca196837f 24f45d063c1d0b30cca8cf5760afc0beae5ebaf0 92ae17e5dd833437b12a1dac20e914ec4e2d3543 2fa7b4a364d6ea2fc062c1e7ba6b525fe4a18e77 23c9a886b1b6a0baafa4d502998833f9e50bc741 cfa751bd8c6c305be378b7f42c8477ccb0d70f7a 925bb6d67eb6c04e8b3870ec338bf112079dd2cd 4edbec8275057e096b40aeb42e5e4f9a51f63b9a 559b4ec5cc995530175f6cdeccdddcddf3df4a5b e83abd4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:30:37:dc:5d:72:6a:6b:e1:6c:ca:dc:07:d3:5e:56:0d:ab:f0:1c] modulus: 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 public exponent: 10001 ] 2022-03-27 04:06:41.087  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-27 04:06:41.089 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-27 04:06:41.091 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-27 04:06:41.092 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-27 04:06:41.092  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-27 04:06:41.093  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-27 04:06:41.094  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-27 04:06:41.094 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-27 04:06:41.094 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-27 04:06:41.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-27 04:06:41.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-27 04:06:41.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:06:41.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:06:41.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:06:41.250  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-27 04:06:41.252  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-27 04:06:41.253 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-27 04:06:41.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:06:41.257  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-27 04:06:41.258  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-27 04:06:41.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:06:41.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:06:41.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:06:41.262 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:06:41.262 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:06:41.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:06:41.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:06:41.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:06:41.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:06:41.268 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-27 04:06:41.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 371923607047146273461788755309512421727828222502 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 27 02:58:20 UTC 2022 Final Date: Fri Mar 26 02:58:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6e:30:ae:07:7c:31:1e:8f:c4:d9:04:a0:49:62:47:a9:e3:f7:0d:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d85b942e62059258b2385fc3a2d7583c79a0916 6b42c66d6bad9c8d0515603a6497f17f8317cbaf c8154694b3f0d66d97847b46bce9ff477324d60c 3710b40b1508894ae0db6695598b775286b28135 98cfacb6e7f18cb4ee61f344d616d9f7aeb80083 e851267d873eec504c7f3cac717ba4913b2bd181 75752ca945d8ff9f55e497f6d812977913d87386 079edce2bcfd13696846a7bf2369d49b5071f6e2 1c2de9c8902f9a4d3158803c6a088a0d6acced98 26e94aa607bd6927f0067c8c93c7ed9dbca6e476 761bd554eca808a6d1a9c22f4248ea8ca196837f 24f45d063c1d0b30cca8cf5760afc0beae5ebaf0 92ae17e5dd833437b12a1dac20e914ec4e2d3543 2fa7b4a364d6ea2fc062c1e7ba6b525fe4a18e77 23c9a886b1b6a0baafa4d502998833f9e50bc741 cfa751bd8c6c305be378b7f42c8477ccb0d70f7a 925bb6d67eb6c04e8b3870ec338bf112079dd2cd 4edbec8275057e096b40aeb42e5e4f9a51f63b9a 559b4ec5cc995530175f6cdeccdddcddf3df4a5b e83abd4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:65:67:ca:d5:86:0d:32:7c:f8:69:b8:8f:d7:cf:0b:53:2a:0b:de] modulus: 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 public exponent: 10001 ] 2022-03-27 04:08:11.125  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-27 04:08:11.126 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-27 04:08:11.128 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-27 04:08:11.129 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-27 04:08:11.130  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-27 04:08:11.131  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-27 04:08:11.131  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-27 04:08:11.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-27 04:08:11.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-27 04:08:11.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-27 04:08:11.140 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-27 04:08:11.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:08:11.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:08:11.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:08:11.250  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-27 04:08:11.251  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-27 04:08:11.252 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-27 04:08:11.252 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:08:11.256  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-27 04:08:11.257  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-27 04:08:11.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:08:11.259 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:08:11.260 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:08:11.261 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:08:11.261 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:08:11.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:08:11.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:08:11.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:08:11.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:08:11.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-27 04:08:11.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 371923607047146273461788755309512421727828222502 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 27 02:58:20 UTC 2022 Final Date: Fri Mar 26 02:58:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6e:30:ae:07:7c:31:1e:8f:c4:d9:04:a0:49:62:47:a9:e3:f7:0d:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d85b942e62059258b2385fc3a2d7583c79a0916 6b42c66d6bad9c8d0515603a6497f17f8317cbaf c8154694b3f0d66d97847b46bce9ff477324d60c 3710b40b1508894ae0db6695598b775286b28135 98cfacb6e7f18cb4ee61f344d616d9f7aeb80083 e851267d873eec504c7f3cac717ba4913b2bd181 75752ca945d8ff9f55e497f6d812977913d87386 079edce2bcfd13696846a7bf2369d49b5071f6e2 1c2de9c8902f9a4d3158803c6a088a0d6acced98 26e94aa607bd6927f0067c8c93c7ed9dbca6e476 761bd554eca808a6d1a9c22f4248ea8ca196837f 24f45d063c1d0b30cca8cf5760afc0beae5ebaf0 92ae17e5dd833437b12a1dac20e914ec4e2d3543 2fa7b4a364d6ea2fc062c1e7ba6b525fe4a18e77 23c9a886b1b6a0baafa4d502998833f9e50bc741 cfa751bd8c6c305be378b7f42c8477ccb0d70f7a 925bb6d67eb6c04e8b3870ec338bf112079dd2cd 4edbec8275057e096b40aeb42e5e4f9a51f63b9a 559b4ec5cc995530175f6cdeccdddcddf3df4a5b e83abd4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:c2:f2:40:2b:3f:2b:80:fc:9e:8d:f7:b9:d9:96:88:0d:ee:0b:8c] modulus: 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 public exponent: 10001 ] 2022-03-27 04:09:42.962  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-27 04:09:42.965 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-27 04:09:42.968 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-27 04:09:42.969 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-27 04:09:42.970  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-27 04:09:42.971  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-27 04:09:42.972  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-27 04:09:42.973 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-27 04:09:42.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-27 04:09:42.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-27 04:09:42.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-27 04:09:42.984 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:09:42.985 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:09:42.985 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:09:43.169  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-27 04:09:43.171  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-27 04:09:43.171 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-27 04:09:43.172 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:09:43.175  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-27 04:09:43.176  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-27 04:09:43.177 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:09:43.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:09:43.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:09:43.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:09:43.181 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:09:43.182 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:09:43.183 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:09:43.183 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:09:43.183 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:09:43.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-27 04:09:43.189 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 371923607047146273461788755309512421727828222502 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 27 02:58:20 UTC 2022 Final Date: Fri Mar 26 02:58:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6e:30:ae:07:7c:31:1e:8f:c4:d9:04:a0:49:62:47:a9:e3:f7:0d:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d85b942e62059258b2385fc3a2d7583c79a0916 6b42c66d6bad9c8d0515603a6497f17f8317cbaf c8154694b3f0d66d97847b46bce9ff477324d60c 3710b40b1508894ae0db6695598b775286b28135 98cfacb6e7f18cb4ee61f344d616d9f7aeb80083 e851267d873eec504c7f3cac717ba4913b2bd181 75752ca945d8ff9f55e497f6d812977913d87386 079edce2bcfd13696846a7bf2369d49b5071f6e2 1c2de9c8902f9a4d3158803c6a088a0d6acced98 26e94aa607bd6927f0067c8c93c7ed9dbca6e476 761bd554eca808a6d1a9c22f4248ea8ca196837f 24f45d063c1d0b30cca8cf5760afc0beae5ebaf0 92ae17e5dd833437b12a1dac20e914ec4e2d3543 2fa7b4a364d6ea2fc062c1e7ba6b525fe4a18e77 23c9a886b1b6a0baafa4d502998833f9e50bc741 cfa751bd8c6c305be378b7f42c8477ccb0d70f7a 925bb6d67eb6c04e8b3870ec338bf112079dd2cd 4edbec8275057e096b40aeb42e5e4f9a51f63b9a 559b4ec5cc995530175f6cdeccdddcddf3df4a5b e83abd4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:3b:1d:c9:f0:ea:e8:3d:25:e5:2f:45:cd:6d:2b:fa:75:06:a2:cf] modulus: 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 public exponent: 10001 ] 2022-03-27 04:10:01.142  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-27 04:10:01.143 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-27 04:10:01.146 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-27 04:10:01.147 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-27 04:10:01.147  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-27 04:10:01.148  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-27 04:10:01.149  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-27 04:10:01.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-27 04:10:01.150 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-27 04:10:01.150 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-27 04:10:01.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-27 04:10:01.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:10:01.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:10:01.165 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:10:01.321  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-27 04:10:01.322  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-27 04:10:01.322 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-27 04:10:01.323 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:10:01.325  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-27 04:10:01.326  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-27 04:10:01.326 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:10:01.327 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:10:01.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:10:01.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:10:01.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:10:01.330 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:10:01.331 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:10:01.331 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:10:01.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:10:01.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-27 04:10:01.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 371923607047146273461788755309512421727828222502 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 27 02:58:20 UTC 2022 Final Date: Fri Mar 26 02:58:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6e:30:ae:07:7c:31:1e:8f:c4:d9:04:a0:49:62:47:a9:e3:f7:0d:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d85b942e62059258b2385fc3a2d7583c79a0916 6b42c66d6bad9c8d0515603a6497f17f8317cbaf c8154694b3f0d66d97847b46bce9ff477324d60c 3710b40b1508894ae0db6695598b775286b28135 98cfacb6e7f18cb4ee61f344d616d9f7aeb80083 e851267d873eec504c7f3cac717ba4913b2bd181 75752ca945d8ff9f55e497f6d812977913d87386 079edce2bcfd13696846a7bf2369d49b5071f6e2 1c2de9c8902f9a4d3158803c6a088a0d6acced98 26e94aa607bd6927f0067c8c93c7ed9dbca6e476 761bd554eca808a6d1a9c22f4248ea8ca196837f 24f45d063c1d0b30cca8cf5760afc0beae5ebaf0 92ae17e5dd833437b12a1dac20e914ec4e2d3543 2fa7b4a364d6ea2fc062c1e7ba6b525fe4a18e77 23c9a886b1b6a0baafa4d502998833f9e50bc741 cfa751bd8c6c305be378b7f42c8477ccb0d70f7a 925bb6d67eb6c04e8b3870ec338bf112079dd2cd 4edbec8275057e096b40aeb42e5e4f9a51f63b9a 559b4ec5cc995530175f6cdeccdddcddf3df4a5b e83abd4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:74:43:53:00:96:be:fd:2d:28:af:14:fe:c2:01:15:35:00:04:d9] modulus: c0248fd4db6928c6a66e2ece41787e07bb0d9928342a2decb71f4d602807474725bde5b9464020295b22db032c3892e794a10f47f60467adf82d847be5cfd5838030d02eeb8b88462dc54f5200668896600e1eb8339800d952f0022c911aaf006a5ecbf91953763729c8649e035d0bda6253a1e1925fbe83cdbfc079db7e4276c43ca6a1254ae3f00d7b6abfa6391564b1d2cc29b2658f1889fce7c71922984da4d6d091cf8026b17315d99efb623ab7f127af899993a4f4a008ab88e68eaf7cfc30ca7246ae1684bb0b864c95183db4c3e5adb88ebddfc6a7d481f40ba20582855d30685424cac97b878653db34bb9a6e845a092ebe07cc19aff4da06f0df17 public exponent: 10001 ] 2022-03-27 04:10:34.044  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-27 04:10:34.045 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-27 04:10:34.046 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-27 04:10:34.047 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-27 04:10:34.047  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-27 04:10:34.048  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-27 04:10:34.049  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-27 04:10:34.049 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-27 04:10:34.049 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-27 04:10:34.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-27 04:10:34.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-27 04:10:34.056 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:10:34.056 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:10:34.056 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:10:34.222  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-27 04:10:34.223  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-27 04:10:34.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-27 04:10:34.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:10:34.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-27 04:10:34.227  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-27 04:10:34.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:10:34.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:10:34.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:10:34.230 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:10:34.231 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:10:34.231 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:10:34.232 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:10:34.232 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:10:34.233 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:10:34.234 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-27 04:10:34.239 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 371923607047146273461788755309512421727828222502 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 27 02:58:20 UTC 2022 Final Date: Fri Mar 26 02:58:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6e:30:ae:07:7c:31:1e:8f:c4:d9:04:a0:49:62:47:a9:e3:f7:0d:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d85b942e62059258b2385fc3a2d7583c79a0916 6b42c66d6bad9c8d0515603a6497f17f8317cbaf c8154694b3f0d66d97847b46bce9ff477324d60c 3710b40b1508894ae0db6695598b775286b28135 98cfacb6e7f18cb4ee61f344d616d9f7aeb80083 e851267d873eec504c7f3cac717ba4913b2bd181 75752ca945d8ff9f55e497f6d812977913d87386 079edce2bcfd13696846a7bf2369d49b5071f6e2 1c2de9c8902f9a4d3158803c6a088a0d6acced98 26e94aa607bd6927f0067c8c93c7ed9dbca6e476 761bd554eca808a6d1a9c22f4248ea8ca196837f 24f45d063c1d0b30cca8cf5760afc0beae5ebaf0 92ae17e5dd833437b12a1dac20e914ec4e2d3543 2fa7b4a364d6ea2fc062c1e7ba6b525fe4a18e77 23c9a886b1b6a0baafa4d502998833f9e50bc741 cfa751bd8c6c305be378b7f42c8477ccb0d70f7a 925bb6d67eb6c04e8b3870ec338bf112079dd2cd 4edbec8275057e096b40aeb42e5e4f9a51f63b9a 559b4ec5cc995530175f6cdeccdddcddf3df4a5b e83abd4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:af:ba:ae:95:0c:c5:e6:17:89:fa:5d:11:84:96:c9:31:c0:be:00] modulus: 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 public exponent: 10001 ] 2022-03-27 04:11:09.727  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-27 04:11:09.728 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-27 04:11:09.730 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-27 04:11:09.731 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-27 04:11:09.732  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-27 04:11:09.733  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-27 04:11:09.734  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-27 04:11:09.744 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-27 04:11:09.745 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-27 04:11:09.745 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-27 04:11:09.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-27 04:11:09.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:11:09.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:11:09.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:11:09.917  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-27 04:11:09.918  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-27 04:11:09.918 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-27 04:11:09.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:11:09.924  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-27 04:11:09.925  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-27 04:11:09.926 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:11:09.926 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:11:09.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:11:09.928 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:11:09.929 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:11:09.929 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:11:09.930 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:11:09.931 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:11:09.932 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:11:09.933 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-27 04:11:09.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 371923607047146273461788755309512421727828222502 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 27 02:58:20 UTC 2022 Final Date: Fri Mar 26 02:58:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6e:30:ae:07:7c:31:1e:8f:c4:d9:04:a0:49:62:47:a9:e3:f7:0d:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d85b942e62059258b2385fc3a2d7583c79a0916 6b42c66d6bad9c8d0515603a6497f17f8317cbaf c8154694b3f0d66d97847b46bce9ff477324d60c 3710b40b1508894ae0db6695598b775286b28135 98cfacb6e7f18cb4ee61f344d616d9f7aeb80083 e851267d873eec504c7f3cac717ba4913b2bd181 75752ca945d8ff9f55e497f6d812977913d87386 079edce2bcfd13696846a7bf2369d49b5071f6e2 1c2de9c8902f9a4d3158803c6a088a0d6acced98 26e94aa607bd6927f0067c8c93c7ed9dbca6e476 761bd554eca808a6d1a9c22f4248ea8ca196837f 24f45d063c1d0b30cca8cf5760afc0beae5ebaf0 92ae17e5dd833437b12a1dac20e914ec4e2d3543 2fa7b4a364d6ea2fc062c1e7ba6b525fe4a18e77 23c9a886b1b6a0baafa4d502998833f9e50bc741 cfa751bd8c6c305be378b7f42c8477ccb0d70f7a 925bb6d67eb6c04e8b3870ec338bf112079dd2cd 4edbec8275057e096b40aeb42e5e4f9a51f63b9a 559b4ec5cc995530175f6cdeccdddcddf3df4a5b e83abd4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:c0:16:32:64:ae:95:a6:13:6c:3a:f1:60:d7:5c:26:c8:af:9f:6f] modulus: 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 public exponent: 10001 ] 2022-03-27 04:12:57.278  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-27 04:12:57.279 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-27 04:12:57.281 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-27 04:12:57.282 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-27 04:12:57.283  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-27 04:12:57.283  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-27 04:12:57.284  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-27 04:12:57.284 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-27 04:12:57.285 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-27 04:12:57.286 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-27 04:12:57.292 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-27 04:12:57.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:12:57.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-27 04:12:57.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:12:57.467  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-27 04:12:57.469  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-27 04:12:57.470 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-27 04:12:57.470 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-27 04:12:57.474  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-27 04:12:57.474  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-27 04:12:57.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:12:57.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:12:57.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:12:57.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:12:57.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:12:57.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:12:57.478 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-27 04:12:57.479 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-27 04:12:57.479 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-27 04:12:57.480 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-27 04:12:57.486 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 371923607047146273461788755309512421727828222502 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Mar 27 02:58:20 UTC 2022 Final Date: Fri Mar 26 02:58:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6e:30:ae:07:7c:31:1e:8f:c4:d9:04:a0:49:62:47:a9:e3:f7:0d:5e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d85b942e62059258b2385fc3a2d7583c79a0916 6b42c66d6bad9c8d0515603a6497f17f8317cbaf c8154694b3f0d66d97847b46bce9ff477324d60c 3710b40b1508894ae0db6695598b775286b28135 98cfacb6e7f18cb4ee61f344d616d9f7aeb80083 e851267d873eec504c7f3cac717ba4913b2bd181 75752ca945d8ff9f55e497f6d812977913d87386 079edce2bcfd13696846a7bf2369d49b5071f6e2 1c2de9c8902f9a4d3158803c6a088a0d6acced98 26e94aa607bd6927f0067c8c93c7ed9dbca6e476 761bd554eca808a6d1a9c22f4248ea8ca196837f 24f45d063c1d0b30cca8cf5760afc0beae5ebaf0 92ae17e5dd833437b12a1dac20e914ec4e2d3543 2fa7b4a364d6ea2fc062c1e7ba6b525fe4a18e77 23c9a886b1b6a0baafa4d502998833f9e50bc741 cfa751bd8c6c305be378b7f42c8477ccb0d70f7a 925bb6d67eb6c04e8b3870ec338bf112079dd2cd 4edbec8275057e096b40aeb42e5e4f9a51f63b9a 559b4ec5cc995530175f6cdeccdddcddf3df4a5b e83abd4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:2b:3c:1f:0a:a8:4b:0b:fa:7f:29:fb:53:47:55:d5:71:4a:fd:b1] modulus: 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 public exponent: 10001 ]