2022-03-28 03:21:31,950 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-28 03:21:34,734 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-28 03:21:36.419  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 28, 2022 3:21:40 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 28, 2022 3:21:40 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 28, 2022 3:21:40 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 28, 2022 3:21:41 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-28 03:21:42.379 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-28 03:21:43.027  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-28 03:21:43.295  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-28 03:21:45.323 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-28 03:21:45.327 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-28 03:21:45.333 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-28 03:21:45.345 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-28 03:21:45.396 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-28 03:21:45.400 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-03-28 03:21:45.572 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-28 03:21:46.547 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 28, 2022 3:21:47 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-28 03:21:48.171  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 18.449 seconds (JVM running for 22.738) Mar 28, 2022 3:22:00 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-28 04:05:06.275  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-28 04:05:06.290 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-28 04:05:06.336 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-28 04:05:06.342 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-28 04:05:06.368  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-28 04:05:06.372  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-28 04:05:06.373  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-28 04:05:06.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-28 04:05:06.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:05:06.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-28 04:05:06.388 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-28 04:05:06.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-28 04:05:06.446 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-28 04:05:06.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:05:06.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:05:06.457 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:05:07.222  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-28 04:05:07.225  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-28 04:05:07.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-28 04:05:07.228 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:05:07.237  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-28 04:05:07.239  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-28 04:05:07.240 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:05:07.240 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:05:07.241 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:05:07.261 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:05:07.262 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:05:07.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:05:07.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:05:07.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:05:07.271 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:05:07.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-28 04:05:07.315 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 68762686558346927741879390435246956174957433319 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 28 02:59:13 UTC 2022 Final Date: Sat Mar 27 02:59:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:4a:32:80:d1:65:18:b4:4a:0d:37:3f:95:95:6a:4d:5e:7f:29:8f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20f431bf62915cc1cafba1c03ba1539c43ed758b 2a8db078837830fd31fa2a9e147f0aa28d083d13 5855e701ae2d1db7635c5b5084145cfa6f0570d1 44d66290782d84bae21b5e3b49ab755b4e0a0851 e6a1faecd27f766afa8853989f9dc597659254f6 7613c68b410c6919ee4aeadd08637aa85c196204 4a708c9f9d8906b66f51a0679ccd38e74feac315 3a1924bd7c63b910366039671e9f90cd5fb2cdff 7b2ec73ff44010b13382fc66fa649de10cab8bf5 a728bc8f914f909ce25cec04130047f05ecdda8d 223b3f2db10ab0a205d3606d6763de5c1934f5fa f968185605255942e1c0978c42cab2377d6ffe78 33d7c7ea6fa6e134651115f109402489878cd97a d8f2939dbf5154ec508b40ed510d540a15f76875 39721fa1c01f74655f852c9a29ebd47acfdd533d 99530d8239fb2aeb2993268c57a993f7f98da979 9a21408666e3a10608c6e817e9a02bc1088a323a 2c2a803525575ded1139bdac1af0c552c494bf67 05420e6ca9694960adc08a3b7ef0c5ef195b3d5b bea98476 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [68:c6:ea:92:10:45:05:70:6f:6f:4f:2a:42:85:9c:6e:f6:f7:54:43] modulus: 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 public exponent: 10001 ] 2022-03-28 04:06:21.824  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-28 04:06:21.826 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-28 04:06:21.828 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-28 04:06:21.828 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-28 04:06:21.829  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-28 04:06:21.830  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-28 04:06:21.830  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-28 04:06:21.831 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-28 04:06:21.832 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-28 04:06:21.833 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-28 04:06:21.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-28 04:06:21.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:06:21.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:06:21.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:06:22.108  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-28 04:06:22.109  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-28 04:06:22.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-28 04:06:22.110 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:06:22.113  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-28 04:06:22.114  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-28 04:06:22.114 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:06:22.115 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:06:22.115 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:06:22.116 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:06:22.117 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:06:22.117 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:06:22.118 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:06:22.119 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:06:22.119 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:06:22.121 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-28 04:06:22.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 68762686558346927741879390435246956174957433319 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 28 02:59:13 UTC 2022 Final Date: Sat Mar 27 02:59:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:4a:32:80:d1:65:18:b4:4a:0d:37:3f:95:95:6a:4d:5e:7f:29:8f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20f431bf62915cc1cafba1c03ba1539c43ed758b 2a8db078837830fd31fa2a9e147f0aa28d083d13 5855e701ae2d1db7635c5b5084145cfa6f0570d1 44d66290782d84bae21b5e3b49ab755b4e0a0851 e6a1faecd27f766afa8853989f9dc597659254f6 7613c68b410c6919ee4aeadd08637aa85c196204 4a708c9f9d8906b66f51a0679ccd38e74feac315 3a1924bd7c63b910366039671e9f90cd5fb2cdff 7b2ec73ff44010b13382fc66fa649de10cab8bf5 a728bc8f914f909ce25cec04130047f05ecdda8d 223b3f2db10ab0a205d3606d6763de5c1934f5fa f968185605255942e1c0978c42cab2377d6ffe78 33d7c7ea6fa6e134651115f109402489878cd97a d8f2939dbf5154ec508b40ed510d540a15f76875 39721fa1c01f74655f852c9a29ebd47acfdd533d 99530d8239fb2aeb2993268c57a993f7f98da979 9a21408666e3a10608c6e817e9a02bc1088a323a 2c2a803525575ded1139bdac1af0c552c494bf67 05420e6ca9694960adc08a3b7ef0c5ef195b3d5b bea98476 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:c8:a2:f1:26:de:1f:19:3e:9c:67:b1:b7:2e:11:1e:6a:7b:d6:8d] modulus: b492bdb3c8e400dcd15aa94a6db6f668f64f0d91f14ba2f4c7908533a8a472aa356f2d8e18e5425eadbafbe018d9ecaf64d67a679f49c8473163c65fa6332f07953f5ae55fd4f92f3e6f3c67405c563a33c807163d4adf0a7c4a70f5a855f811ab84fa3ca0f0e52891ece92971bec0f141cfc317ac57f22fee5fc9a657fb0c53f0597b6325fc5e6b9f58ad191767e4522cb1f882a3090af43984dacc5741b2943ffdf9c16fd27eb9abad99606de9f6d7b49fcad63ecbf6af125d2378ba19dbb6259561a84d60612d9cac26426a690669db83a1105eeb3c40d5a7f6fddfd96147c92951f154257cad6c4b3417534d13942874368859278c44b8b56e64b6b168ef public exponent: 10001 ] 2022-03-28 04:07:55.203  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-28 04:07:55.205 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-28 04:07:55.209 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-28 04:07:55.212 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-28 04:07:55.213  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-28 04:07:55.216  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-28 04:07:55.217  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-28 04:07:55.218 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-28 04:07:55.220 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-28 04:07:55.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-28 04:07:55.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-28 04:07:55.230 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:07:55.230 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:07:55.230 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:07:55.381  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-28 04:07:55.382  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-28 04:07:55.383 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-28 04:07:55.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:07:55.399  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-28 04:07:55.414  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-28 04:07:55.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:07:55.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:07:55.420 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:07:55.431 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:07:55.440 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:07:55.441 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:07:55.447 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:07:55.448 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:07:55.451 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:07:55.453 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-28 04:07:55.461 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 68762686558346927741879390435246956174957433319 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 28 02:59:13 UTC 2022 Final Date: Sat Mar 27 02:59:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:4a:32:80:d1:65:18:b4:4a:0d:37:3f:95:95:6a:4d:5e:7f:29:8f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20f431bf62915cc1cafba1c03ba1539c43ed758b 2a8db078837830fd31fa2a9e147f0aa28d083d13 5855e701ae2d1db7635c5b5084145cfa6f0570d1 44d66290782d84bae21b5e3b49ab755b4e0a0851 e6a1faecd27f766afa8853989f9dc597659254f6 7613c68b410c6919ee4aeadd08637aa85c196204 4a708c9f9d8906b66f51a0679ccd38e74feac315 3a1924bd7c63b910366039671e9f90cd5fb2cdff 7b2ec73ff44010b13382fc66fa649de10cab8bf5 a728bc8f914f909ce25cec04130047f05ecdda8d 223b3f2db10ab0a205d3606d6763de5c1934f5fa f968185605255942e1c0978c42cab2377d6ffe78 33d7c7ea6fa6e134651115f109402489878cd97a d8f2939dbf5154ec508b40ed510d540a15f76875 39721fa1c01f74655f852c9a29ebd47acfdd533d 99530d8239fb2aeb2993268c57a993f7f98da979 9a21408666e3a10608c6e817e9a02bc1088a323a 2c2a803525575ded1139bdac1af0c552c494bf67 05420e6ca9694960adc08a3b7ef0c5ef195b3d5b bea98476 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:21:79:e1:1e:6b:82:f5:3c:63:f9:fb:1e:f1:79:d5:d6:5c:01:55] modulus: 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 public exponent: 10001 ] 2022-03-28 04:09:11.372  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-28 04:09:11.374 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-28 04:09:11.375 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-28 04:09:11.376 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-28 04:09:11.376  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-28 04:09:11.377  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-28 04:09:11.378  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-28 04:09:11.378 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-28 04:09:11.379 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-28 04:09:11.380 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-28 04:09:11.387 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-28 04:09:11.392 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:09:11.392 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:09:11.393 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:09:11.584  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-28 04:09:11.585  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-28 04:09:11.586 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-28 04:09:11.586 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:09:11.592  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-28 04:09:11.592  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-28 04:09:11.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:09:11.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:09:11.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:09:11.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:09:11.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:09:11.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:09:11.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:09:11.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:09:11.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:09:11.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-28 04:09:11.611 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 68762686558346927741879390435246956174957433319 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 28 02:59:13 UTC 2022 Final Date: Sat Mar 27 02:59:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:4a:32:80:d1:65:18:b4:4a:0d:37:3f:95:95:6a:4d:5e:7f:29:8f] modulus: bafa89a1691c94e4286f52c02cd9ce854c7086bdcc617e6aa782f0d4302203b4afe5ea86365ffb2005605e543d85d175f63229ef225d01644692795dbe44643051940e7d9e374c014a5ec876f602bc1e842d4bfeb03b163138b3ee1b0fc2f033583db9168d8ef4f24a690e2e2dfda0406107f910fa46b8ea129adee381415e81e71a7b5e00d7f6eee0e4e8771569c67729f4c4b4c8e6b587965bad10fce1d0af66c3847385b49a6e80df172a0f350eefbf9cd511d0b316a4958b2f3335ab735ef503bc21ce67be93195c95110c44ae843784aa5bf6b468bb66e1b379cd40c6baf68744bb330b42494719f74524de02b904bfc0272b1556d02cfe4334ef18a4f422f3f84ff5a41ce3b60ce6ac62b301b5bdd2aa764b6cf375ab36faf5e8052481930232d08683d673faefc066091fb45f2f046d0671fc58301da2117566b548398a8fe28337dbd13766da847c6ec0a41898d85a5e7dfeb2a9998f2967444203196255ab8803c8ee80f453832b45e21b2bb1a91a872490a0a5e0cd4145f0d9594d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20f431bf62915cc1cafba1c03ba1539c43ed758b 2a8db078837830fd31fa2a9e147f0aa28d083d13 5855e701ae2d1db7635c5b5084145cfa6f0570d1 44d66290782d84bae21b5e3b49ab755b4e0a0851 e6a1faecd27f766afa8853989f9dc597659254f6 7613c68b410c6919ee4aeadd08637aa85c196204 4a708c9f9d8906b66f51a0679ccd38e74feac315 3a1924bd7c63b910366039671e9f90cd5fb2cdff 7b2ec73ff44010b13382fc66fa649de10cab8bf5 a728bc8f914f909ce25cec04130047f05ecdda8d 223b3f2db10ab0a205d3606d6763de5c1934f5fa f968185605255942e1c0978c42cab2377d6ffe78 33d7c7ea6fa6e134651115f109402489878cd97a d8f2939dbf5154ec508b40ed510d540a15f76875 39721fa1c01f74655f852c9a29ebd47acfdd533d 99530d8239fb2aeb2993268c57a993f7f98da979 9a21408666e3a10608c6e817e9a02bc1088a323a 2c2a803525575ded1139bdac1af0c552c494bf67 05420e6ca9694960adc08a3b7ef0c5ef195b3d5b bea98476 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:fe:f0:55:4a:a7:64:6f:c4:f3:6c:df:68:c8:23:33:0d:8d:1f:23] modulus: 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 public exponent: 10001 ] 2022-03-28 04:09:45.090  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-28 04:09:45.091 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-28 04:09:45.092 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-28 04:09:45.093 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-28 04:09:45.093  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-28 04:09:45.094  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-28 04:09:45.094  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-28 04:09:45.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-28 04:09:45.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-28 04:09:45.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-28 04:09:45.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-28 04:09:45.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:09:45.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:09:45.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:09:45.272  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-28 04:09:45.273  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-28 04:09:45.273 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-28 04:09:45.274 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:09:45.276  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-28 04:09:45.276  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-28 04:09:45.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:09:45.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:09:45.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:09:45.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:09:45.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:09:45.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:09:45.280 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:09:45.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:09:45.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:09:45.282 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-28 04:09:45.287 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 68762686558346927741879390435246956174957433319 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 28 02:59:13 UTC 2022 Final Date: Sat Mar 27 02:59:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:4a:32:80:d1:65:18:b4:4a:0d:37:3f:95:95:6a:4d:5e:7f:29:8f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20f431bf62915cc1cafba1c03ba1539c43ed758b 2a8db078837830fd31fa2a9e147f0aa28d083d13 5855e701ae2d1db7635c5b5084145cfa6f0570d1 44d66290782d84bae21b5e3b49ab755b4e0a0851 e6a1faecd27f766afa8853989f9dc597659254f6 7613c68b410c6919ee4aeadd08637aa85c196204 4a708c9f9d8906b66f51a0679ccd38e74feac315 3a1924bd7c63b910366039671e9f90cd5fb2cdff 7b2ec73ff44010b13382fc66fa649de10cab8bf5 a728bc8f914f909ce25cec04130047f05ecdda8d 223b3f2db10ab0a205d3606d6763de5c1934f5fa f968185605255942e1c0978c42cab2377d6ffe78 33d7c7ea6fa6e134651115f109402489878cd97a d8f2939dbf5154ec508b40ed510d540a15f76875 39721fa1c01f74655f852c9a29ebd47acfdd533d 99530d8239fb2aeb2993268c57a993f7f98da979 9a21408666e3a10608c6e817e9a02bc1088a323a 2c2a803525575ded1139bdac1af0c552c494bf67 05420e6ca9694960adc08a3b7ef0c5ef195b3d5b bea98476 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:e2:08:4d:5b:e7:8e:ce:b9:4e:cb:40:ca:ea:0a:3c:97:54:6e:f0] modulus: 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 public exponent: 10001 ] 2022-03-28 04:09:47.370  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-28 04:09:47.371 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-28 04:09:47.372 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-28 04:09:47.373 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-28 04:09:47.373  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-28 04:09:47.374  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-28 04:09:47.374  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-28 04:09:47.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-28 04:09:47.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-28 04:09:47.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-28 04:09:47.381 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-28 04:09:47.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:09:47.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:09:47.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:09:47.513  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-28 04:09:47.514  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-28 04:09:47.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-28 04:09:47.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:09:47.517  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-28 04:09:47.518  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-28 04:09:47.518 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:09:47.519 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:09:47.519 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:09:47.520 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:09:47.520 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:09:47.521 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:09:47.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:09:47.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:09:47.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:09:47.523 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-28 04:09:47.527 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 68762686558346927741879390435246956174957433319 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 28 02:59:13 UTC 2022 Final Date: Sat Mar 27 02:59:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:4a:32:80:d1:65:18:b4:4a:0d:37:3f:95:95:6a:4d:5e:7f:29:8f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20f431bf62915cc1cafba1c03ba1539c43ed758b 2a8db078837830fd31fa2a9e147f0aa28d083d13 5855e701ae2d1db7635c5b5084145cfa6f0570d1 44d66290782d84bae21b5e3b49ab755b4e0a0851 e6a1faecd27f766afa8853989f9dc597659254f6 7613c68b410c6919ee4aeadd08637aa85c196204 4a708c9f9d8906b66f51a0679ccd38e74feac315 3a1924bd7c63b910366039671e9f90cd5fb2cdff 7b2ec73ff44010b13382fc66fa649de10cab8bf5 a728bc8f914f909ce25cec04130047f05ecdda8d 223b3f2db10ab0a205d3606d6763de5c1934f5fa f968185605255942e1c0978c42cab2377d6ffe78 33d7c7ea6fa6e134651115f109402489878cd97a d8f2939dbf5154ec508b40ed510d540a15f76875 39721fa1c01f74655f852c9a29ebd47acfdd533d 99530d8239fb2aeb2993268c57a993f7f98da979 9a21408666e3a10608c6e817e9a02bc1088a323a 2c2a803525575ded1139bdac1af0c552c494bf67 05420e6ca9694960adc08a3b7ef0c5ef195b3d5b bea98476 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:e8:dc:25:ed:12:ce:d8:18:96:58:b7:e1:74:3b:08:72:25:7b:17] modulus: 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 public exponent: 10001 ] 2022-03-28 04:10:22.649  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-28 04:10:22.651 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-28 04:10:22.652 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-28 04:10:22.653 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-28 04:10:22.654  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-28 04:10:22.654  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-28 04:10:22.655  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-28 04:10:22.656 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-28 04:10:22.657 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-28 04:10:22.657 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-28 04:10:22.665 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-28 04:10:22.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:10:22.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:10:22.668 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:10:22.847  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-28 04:10:22.848  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-28 04:10:22.848 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-28 04:10:22.848 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:10:22.850  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-28 04:10:22.850  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-28 04:10:22.850 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:10:22.850 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:10:22.851 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:10:22.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:10:22.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:10:22.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:10:22.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:10:22.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:10:22.854 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:10:22.854 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-28 04:10:22.858 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 68762686558346927741879390435246956174957433319 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 28 02:59:13 UTC 2022 Final Date: Sat Mar 27 02:59:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:4a:32:80:d1:65:18:b4:4a:0d:37:3f:95:95:6a:4d:5e:7f:29:8f] modulus: bafa89a1691c94e4286f52c02cd9ce854c7086bdcc617e6aa782f0d4302203b4afe5ea86365ffb2005605e543d85d175f63229ef225d01644692795dbe44643051940e7d9e374c014a5ec876f602bc1e842d4bfeb03b163138b3ee1b0fc2f033583db9168d8ef4f24a690e2e2dfda0406107f910fa46b8ea129adee381415e81e71a7b5e00d7f6eee0e4e8771569c67729f4c4b4c8e6b587965bad10fce1d0af66c3847385b49a6e80df172a0f350eefbf9cd511d0b316a4958b2f3335ab735ef503bc21ce67be93195c95110c44ae843784aa5bf6b468bb66e1b379cd40c6baf68744bb330b42494719f74524de02b904bfc0272b1556d02cfe4334ef18a4f422f3f84ff5a41ce3b60ce6ac62b301b5bdd2aa764b6cf375ab36faf5e8052481930232d08683d673faefc066091fb45f2f046d0671fc58301da2117566b548398a8fe28337dbd13766da847c6ec0a41898d85a5e7dfeb2a9998f2967444203196255ab8803c8ee80f453832b45e21b2bb1a91a872490a0a5e0cd4145f0d9594d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20f431bf62915cc1cafba1c03ba1539c43ed758b 2a8db078837830fd31fa2a9e147f0aa28d083d13 5855e701ae2d1db7635c5b5084145cfa6f0570d1 44d66290782d84bae21b5e3b49ab755b4e0a0851 e6a1faecd27f766afa8853989f9dc597659254f6 7613c68b410c6919ee4aeadd08637aa85c196204 4a708c9f9d8906b66f51a0679ccd38e74feac315 3a1924bd7c63b910366039671e9f90cd5fb2cdff 7b2ec73ff44010b13382fc66fa649de10cab8bf5 a728bc8f914f909ce25cec04130047f05ecdda8d 223b3f2db10ab0a205d3606d6763de5c1934f5fa f968185605255942e1c0978c42cab2377d6ffe78 33d7c7ea6fa6e134651115f109402489878cd97a d8f2939dbf5154ec508b40ed510d540a15f76875 39721fa1c01f74655f852c9a29ebd47acfdd533d 99530d8239fb2aeb2993268c57a993f7f98da979 9a21408666e3a10608c6e817e9a02bc1088a323a 2c2a803525575ded1139bdac1af0c552c494bf67 05420e6ca9694960adc08a3b7ef0c5ef195b3d5b bea98476 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:de:5e:df:3d:63:eb:e2:e6:a6:f2:11:6b:5e:f7:6c:3b:35:09:27] modulus: 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 public exponent: 10001 ] 2022-03-28 04:12:06.098  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-28 04:12:06.100 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-28 04:12:06.102 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-28 04:12:06.103 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-28 04:12:06.103  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-28 04:12:06.104  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-28 04:12:06.105  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-28 04:12:06.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-28 04:12:06.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-28 04:12:06.106 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-28 04:12:06.112 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-28 04:12:06.113 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:12:06.113 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-28 04:12:06.113 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:12:06.313  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-28 04:12:06.314  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-28 04:12:06.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-28 04:12:06.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-28 04:12:06.316  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-28 04:12:06.316  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-28 04:12:06.316 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:12:06.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:12:06.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:12:06.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:12:06.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:12:06.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:12:06.319 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-28 04:12:06.319 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-28 04:12:06.319 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-28 04:12:06.320 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-28 04:12:06.324 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 68762686558346927741879390435246956174957433319 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Mar 28 02:59:13 UTC 2022 Final Date: Sat Mar 27 02:59:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5e:4a:32:80:d1:65:18:b4:4a:0d:37:3f:95:95:6a:4d:5e:7f:29:8f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20f431bf62915cc1cafba1c03ba1539c43ed758b 2a8db078837830fd31fa2a9e147f0aa28d083d13 5855e701ae2d1db7635c5b5084145cfa6f0570d1 44d66290782d84bae21b5e3b49ab755b4e0a0851 e6a1faecd27f766afa8853989f9dc597659254f6 7613c68b410c6919ee4aeadd08637aa85c196204 4a708c9f9d8906b66f51a0679ccd38e74feac315 3a1924bd7c63b910366039671e9f90cd5fb2cdff 7b2ec73ff44010b13382fc66fa649de10cab8bf5 a728bc8f914f909ce25cec04130047f05ecdda8d 223b3f2db10ab0a205d3606d6763de5c1934f5fa f968185605255942e1c0978c42cab2377d6ffe78 33d7c7ea6fa6e134651115f109402489878cd97a d8f2939dbf5154ec508b40ed510d540a15f76875 39721fa1c01f74655f852c9a29ebd47acfdd533d 99530d8239fb2aeb2993268c57a993f7f98da979 9a21408666e3a10608c6e817e9a02bc1088a323a 2c2a803525575ded1139bdac1af0c552c494bf67 05420e6ca9694960adc08a3b7ef0c5ef195b3d5b bea98476 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:08:79:97:f7:3b:ae:f5:3c:a6:4a:fb:2d:3e:fc:86:9d:70:63:a5] modulus: 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 public exponent: 10001 ]