2022-04-05 02:53:04,822 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-05 02:53:06,593 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-05 02:53:07.893  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 05, 2022 2:53:11 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 05, 2022 2:53:11 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 05, 2022 2:53:11 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 05, 2022 2:53:11 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-05 02:53:12.221 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-05 02:53:12.715  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-05 02:53:12.989  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-05 02:53:14.159 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-05 02:53:14.164 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-04-05 02:53:14.166 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-05 02:53:14.170 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-05 02:53:14.225 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-04-05 02:53:14.229 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-05 02:53:14.386 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-05 02:53:15.346 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 05, 2022 2:53:16 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-05 02:53:17.014  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 13.673 seconds (JVM running for 16.499) Apr 05, 2022 2:53:38 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-05 02:54:09.993  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 02:54:10.005 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 02:54:10.054 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-05 02:54:10.059 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 02:54:10.084  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-05 02:54:10.087  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 02:54:10.088  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 02:54:10.090 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 02:54:10.091 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 02:54:10.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 02:54:10.106 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 02:54:10.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 02:54:10.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 02:54:10.160 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 02:54:10.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 02:54:10.166 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 02:54:10.895  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 02:54:10.898  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 02:54:10.899 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 02:54:10.900 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 02:54:10.913  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 02:54:10.914  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 02:54:10.915 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 02:54:10.916 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 02:54:10.916 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 02:54:10.929 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 02:54:10.929 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 02:54:10.930 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 02:54:10.936 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 02:54:10.936 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 02:54:10.937 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 02:54:10.939 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 02:54:10.974 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495497344434582504885667335922071568769170334117 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 02:50:36 UTC 2022 Final Date: Sun Apr 04 02:50:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:21:5b:bf:e0:50:7b:a4:27:96:ff:bf:70:8f:a9:e0:9b:cc:dc:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b60e03f75e763d5b6aedb526945c83fceb7d768 b6af0ba42cfc9a2f284d03d08edce163e0315348 d40514103fc91f1943214b82c3c2de3b9c05eba2 1d15edd04111960f5c16e52044d35e5acf88cc98 a0b5ed562fee64c723788cefbbb1c2b109b5dae2 4bdb02e9b785d7297997acec6e8ea874282e0ba6 cf8a42c402cac719099b2ccccebfbfd3b0722020 1dd776ad2843d17b1d7e03465813e5432410323d 2c19b051a5bbc5bbbda9888a582d803a02ee4551 98d9bceee50ba68702064dc1fb6118d7d3853fff 2f5181c06504c89263a5753ab40f4ef6383fbef7 c16ea2f44746d60522c978a5669156931360bf03 92292b1437b5da4f0080f742b79d3d11180bbde5 6cf6220d4ffe97706eda51b808cd833b866b2c25 43ad53d345b3b1ac4b7561b9405a60c514408dbb 0df26b7f1be7c2ea94b1f96b24c39ba9a8727ed4 32c93c7a59d70a7a569cca5cced48f02b0f35506 31046b5734851e03ce0d6c0d435b0c03c77e247c 17b71fadf756c321782602e0fdc0450c94808141 a6d197d8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:4d:45:b6:99:e9:ba:81:68:44:96:6e:b9:4d:ac:00:6c:cb:b9:b8] modulus: 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 public exponent: 10001 ] 2022-04-05 03:55:23.827  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 03:55:23.831 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 03:55:23.835 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-05 03:55:23.836 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 03:55:23.837  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-05 03:55:23.838  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 03:55:23.839  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 03:55:23.840 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 03:55:23.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 03:55:23.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 03:55:23.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 03:55:23.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 03:55:23.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 03:55:23.856 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 03:55:24.090  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 03:55:24.091  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 03:55:24.092 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 03:55:24.092 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 03:55:24.097  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 03:55:24.098  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 03:55:24.098 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:55:24.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:55:24.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:55:24.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:55:24.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:55:24.102 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:55:24.103 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:55:24.103 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:55:24.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:55:24.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 03:55:24.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495497344434582504885667335922071568769170334117 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 02:50:36 UTC 2022 Final Date: Sun Apr 04 02:50:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:21:5b:bf:e0:50:7b:a4:27:96:ff:bf:70:8f:a9:e0:9b:cc:dc:da] modulus: ca959e27abdfd900e242eb18bf6aad81251b45ffadebb0434a185621406134ca46a91b1742046f3bc59f84d6dad6961e789d0b10e6c76ef6423293e6971484559f426301dbdb27600d73572688588aaa0847651d8019a66fa638ddef3c904a5b3ddc850d6652d1c3945392d19c409d96fce6201a9ed6cc883c92c965708561a1f6f516c384b67f985fccc23b87466beb4584a4af6c4817ba115bf13afa537316ed7a2243b6aee1d0320ea704c347595eb79d811c1e9e0a08c8f5581c38ba6cc1f9e1c7c59084c8c372d0a14afa43e7432b85105d272fb45fc4f8e089bfc81eeffdff893bc50c0867256b0d4c6002b4a2b39ab151b784138ce73483d47309a2c9840f58c196aa5b79fe4958c22aa03c5a85554d706f93fc863e9ee7371635aa33280fc8fda592a3c694ca833338edb4873dcc16a1cb1b4502a1fe00eba35ff39365ba8fd8890a2de7f88cabff7a4186b6e1239595124814b0ca0e7ca8ca67a9eec0ffc5085c019eaad9e50857442614efe55ceee275eeec642e74f42c23cf7a47 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b60e03f75e763d5b6aedb526945c83fceb7d768 b6af0ba42cfc9a2f284d03d08edce163e0315348 d40514103fc91f1943214b82c3c2de3b9c05eba2 1d15edd04111960f5c16e52044d35e5acf88cc98 a0b5ed562fee64c723788cefbbb1c2b109b5dae2 4bdb02e9b785d7297997acec6e8ea874282e0ba6 cf8a42c402cac719099b2ccccebfbfd3b0722020 1dd776ad2843d17b1d7e03465813e5432410323d 2c19b051a5bbc5bbbda9888a582d803a02ee4551 98d9bceee50ba68702064dc1fb6118d7d3853fff 2f5181c06504c89263a5753ab40f4ef6383fbef7 c16ea2f44746d60522c978a5669156931360bf03 92292b1437b5da4f0080f742b79d3d11180bbde5 6cf6220d4ffe97706eda51b808cd833b866b2c25 43ad53d345b3b1ac4b7561b9405a60c514408dbb 0df26b7f1be7c2ea94b1f96b24c39ba9a8727ed4 32c93c7a59d70a7a569cca5cced48f02b0f35506 31046b5734851e03ce0d6c0d435b0c03c77e247c 17b71fadf756c321782602e0fdc0450c94808141 a6d197d8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:cf:c3:66:f9:d4:50:d3:da:0e:c1:3c:9c:81:8c:28:42:cc:11:64] modulus: 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 public exponent: 10001 ] 2022-04-05 03:56:35.262  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 03:56:35.264 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 03:56:35.273 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-05 03:56:35.276 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 03:56:35.277  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-05 03:56:35.279  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 03:56:35.280  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 03:56:35.281 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 03:56:35.281 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 03:56:35.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 03:56:35.299 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 03:56:35.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 03:56:35.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 03:56:35.301 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 03:56:35.602  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 03:56:35.603  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 03:56:35.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 03:56:35.607 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 03:56:35.627  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 03:56:35.629  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 03:56:35.632 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:56:35.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:56:35.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:56:35.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:56:35.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:56:35.637 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:56:35.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:56:35.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:56:35.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:56:35.641 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 03:56:35.646 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495497344434582504885667335922071568769170334117 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 02:50:36 UTC 2022 Final Date: Sun Apr 04 02:50:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:21:5b:bf:e0:50:7b:a4:27:96:ff:bf:70:8f:a9:e0:9b:cc:dc:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b60e03f75e763d5b6aedb526945c83fceb7d768 b6af0ba42cfc9a2f284d03d08edce163e0315348 d40514103fc91f1943214b82c3c2de3b9c05eba2 1d15edd04111960f5c16e52044d35e5acf88cc98 a0b5ed562fee64c723788cefbbb1c2b109b5dae2 4bdb02e9b785d7297997acec6e8ea874282e0ba6 cf8a42c402cac719099b2ccccebfbfd3b0722020 1dd776ad2843d17b1d7e03465813e5432410323d 2c19b051a5bbc5bbbda9888a582d803a02ee4551 98d9bceee50ba68702064dc1fb6118d7d3853fff 2f5181c06504c89263a5753ab40f4ef6383fbef7 c16ea2f44746d60522c978a5669156931360bf03 92292b1437b5da4f0080f742b79d3d11180bbde5 6cf6220d4ffe97706eda51b808cd833b866b2c25 43ad53d345b3b1ac4b7561b9405a60c514408dbb 0df26b7f1be7c2ea94b1f96b24c39ba9a8727ed4 32c93c7a59d70a7a569cca5cced48f02b0f35506 31046b5734851e03ce0d6c0d435b0c03c77e247c 17b71fadf756c321782602e0fdc0450c94808141 a6d197d8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:a0:fe:9e:92:20:f7:c6:42:65:c2:a6:e2:be:af:64:d1:a4:01:dd] modulus: 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 public exponent: 10001 ] 2022-04-05 03:58:06.955  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 03:58:06.956 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 03:58:06.960 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-05 03:58:06.961 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 03:58:06.962  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-05 03:58:06.964  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 03:58:06.964  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 03:58:06.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 03:58:06.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 03:58:06.966 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 03:58:06.971 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 03:58:06.972 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 03:58:06.974 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 03:58:06.974 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 03:58:07.111  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 03:58:07.112  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 03:58:07.113 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 03:58:07.113 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 03:58:07.116  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 03:58:07.117  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 03:58:07.118 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:58:07.118 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:58:07.118 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:58:07.119 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:58:07.120 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:58:07.120 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:58:07.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:58:07.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:58:07.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:58:07.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 03:58:07.128 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495497344434582504885667335922071568769170334117 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 02:50:36 UTC 2022 Final Date: Sun Apr 04 02:50:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:21:5b:bf:e0:50:7b:a4:27:96:ff:bf:70:8f:a9:e0:9b:cc:dc:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b60e03f75e763d5b6aedb526945c83fceb7d768 b6af0ba42cfc9a2f284d03d08edce163e0315348 d40514103fc91f1943214b82c3c2de3b9c05eba2 1d15edd04111960f5c16e52044d35e5acf88cc98 a0b5ed562fee64c723788cefbbb1c2b109b5dae2 4bdb02e9b785d7297997acec6e8ea874282e0ba6 cf8a42c402cac719099b2ccccebfbfd3b0722020 1dd776ad2843d17b1d7e03465813e5432410323d 2c19b051a5bbc5bbbda9888a582d803a02ee4551 98d9bceee50ba68702064dc1fb6118d7d3853fff 2f5181c06504c89263a5753ab40f4ef6383fbef7 c16ea2f44746d60522c978a5669156931360bf03 92292b1437b5da4f0080f742b79d3d11180bbde5 6cf6220d4ffe97706eda51b808cd833b866b2c25 43ad53d345b3b1ac4b7561b9405a60c514408dbb 0df26b7f1be7c2ea94b1f96b24c39ba9a8727ed4 32c93c7a59d70a7a569cca5cced48f02b0f35506 31046b5734851e03ce0d6c0d435b0c03c77e247c 17b71fadf756c321782602e0fdc0450c94808141 a6d197d8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ec:84:8b:94:01:1c:fc:15:6d:fe:59:6b:52:31:2e:3e:87:7b:f3:f2] modulus: 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 public exponent: 10001 ] 2022-04-05 03:59:36.617  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 03:59:36.621 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 03:59:36.623 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-05 03:59:36.628 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 03:59:36.629  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-05 03:59:36.630  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 03:59:36.631  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 03:59:36.634 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 03:59:36.634 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 03:59:36.635 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 03:59:36.641 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 03:59:36.642 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 03:59:36.642 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 03:59:36.643 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 03:59:36.898  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 03:59:36.899  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 03:59:36.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 03:59:36.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 03:59:36.902  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 03:59:36.903  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 03:59:36.903 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:59:36.904 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:59:36.904 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:59:36.905 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:59:36.905 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:59:36.906 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:59:36.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:59:36.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:59:36.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:59:36.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 03:59:36.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495497344434582504885667335922071568769170334117 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 02:50:36 UTC 2022 Final Date: Sun Apr 04 02:50:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:21:5b:bf:e0:50:7b:a4:27:96:ff:bf:70:8f:a9:e0:9b:cc:dc:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b60e03f75e763d5b6aedb526945c83fceb7d768 b6af0ba42cfc9a2f284d03d08edce163e0315348 d40514103fc91f1943214b82c3c2de3b9c05eba2 1d15edd04111960f5c16e52044d35e5acf88cc98 a0b5ed562fee64c723788cefbbb1c2b109b5dae2 4bdb02e9b785d7297997acec6e8ea874282e0ba6 cf8a42c402cac719099b2ccccebfbfd3b0722020 1dd776ad2843d17b1d7e03465813e5432410323d 2c19b051a5bbc5bbbda9888a582d803a02ee4551 98d9bceee50ba68702064dc1fb6118d7d3853fff 2f5181c06504c89263a5753ab40f4ef6383fbef7 c16ea2f44746d60522c978a5669156931360bf03 92292b1437b5da4f0080f742b79d3d11180bbde5 6cf6220d4ffe97706eda51b808cd833b866b2c25 43ad53d345b3b1ac4b7561b9405a60c514408dbb 0df26b7f1be7c2ea94b1f96b24c39ba9a8727ed4 32c93c7a59d70a7a569cca5cced48f02b0f35506 31046b5734851e03ce0d6c0d435b0c03c77e247c 17b71fadf756c321782602e0fdc0450c94808141 a6d197d8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:6c:d6:2d:0c:15:af:94:9d:8f:06:83:a3:f9:64:42:f8:c9:2c:49] modulus: a02c6ec3cac734f9e7bc1481b78eab510fe6a36ce803ec0b5a88eb709b1698f6106a0730e92c122f0a6bde6b1452765e483cbd8ca1fa70e5f33890b1c26febccce1cc540c6777593504cd1371e1826e2fafa811fa89181439d522747f1d683ae43272cc81b3397083148c72ab896dfb8235cac5ad956857a025c39c7d66bf047703ca8e105586366ac9fd482129d0fcb3d1d4c326bdc3f37c434dadd705e95e3fc15cc67ddb01aef6805636df934c9124b7abb948e008e31b9b67e08793506026b816896e29346591e2a21c23c4cd2a07997cf61d1c993359c13c02fa1e13d0e4026baa2e59310bc0c52f1aea3ee70cce83ee9bb5c753367733cccdb87198fef public exponent: 10001 ] 2022-04-05 03:59:56.101  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 03:59:56.102 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 03:59:56.104 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-04-05 03:59:56.106 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 03:59:56.107  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-04-05 03:59:56.107  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 03:59:56.108  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 03:59:56.108 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 03:59:56.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 03:59:56.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 03:59:56.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 03:59:56.119 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 03:59:56.119 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 03:59:56.120 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 03:59:56.315  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 03:59:56.316  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 03:59:56.316 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 03:59:56.316 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 03:59:56.318  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 03:59:56.318  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 03:59:56.319 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:59:56.319 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:59:56.320 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:59:56.320 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:59:56.321 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:59:56.321 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:59:56.322 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 03:59:56.323 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 03:59:56.323 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 03:59:56.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 03:59:56.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495497344434582504885667335922071568769170334117 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 02:50:36 UTC 2022 Final Date: Sun Apr 04 02:50:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:21:5b:bf:e0:50:7b:a4:27:96:ff:bf:70:8f:a9:e0:9b:cc:dc:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b60e03f75e763d5b6aedb526945c83fceb7d768 b6af0ba42cfc9a2f284d03d08edce163e0315348 d40514103fc91f1943214b82c3c2de3b9c05eba2 1d15edd04111960f5c16e52044d35e5acf88cc98 a0b5ed562fee64c723788cefbbb1c2b109b5dae2 4bdb02e9b785d7297997acec6e8ea874282e0ba6 cf8a42c402cac719099b2ccccebfbfd3b0722020 1dd776ad2843d17b1d7e03465813e5432410323d 2c19b051a5bbc5bbbda9888a582d803a02ee4551 98d9bceee50ba68702064dc1fb6118d7d3853fff 2f5181c06504c89263a5753ab40f4ef6383fbef7 c16ea2f44746d60522c978a5669156931360bf03 92292b1437b5da4f0080f742b79d3d11180bbde5 6cf6220d4ffe97706eda51b808cd833b866b2c25 43ad53d345b3b1ac4b7561b9405a60c514408dbb 0df26b7f1be7c2ea94b1f96b24c39ba9a8727ed4 32c93c7a59d70a7a569cca5cced48f02b0f35506 31046b5734851e03ce0d6c0d435b0c03c77e247c 17b71fadf756c321782602e0fdc0450c94808141 a6d197d8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:c7:51:cc:35:12:07:e7:04:09:37:a9:7e:40:22:55:69:f4:09:22] modulus: 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 public exponent: 10001 ] 2022-04-05 04:00:10.046  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 04:00:10.047 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 04:00:10.049 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-05 04:00:10.050 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 04:00:10.051  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-05 04:00:10.052  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 04:00:10.052  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 04:00:10.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 04:00:10.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 04:00:10.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 04:00:10.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 04:00:10.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 04:00:10.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 04:00:10.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 04:00:10.275  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 04:00:10.277  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 04:00:10.278 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 04:00:10.278 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 04:00:10.281  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 04:00:10.282  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 04:00:10.283 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 04:00:10.283 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 04:00:10.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 04:00:10.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 04:00:10.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 04:00:10.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 04:00:10.287 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 04:00:10.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 04:00:10.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 04:00:10.290 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 04:00:10.297 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495497344434582504885667335922071568769170334117 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 02:50:36 UTC 2022 Final Date: Sun Apr 04 02:50:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:21:5b:bf:e0:50:7b:a4:27:96:ff:bf:70:8f:a9:e0:9b:cc:dc:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b60e03f75e763d5b6aedb526945c83fceb7d768 b6af0ba42cfc9a2f284d03d08edce163e0315348 d40514103fc91f1943214b82c3c2de3b9c05eba2 1d15edd04111960f5c16e52044d35e5acf88cc98 a0b5ed562fee64c723788cefbbb1c2b109b5dae2 4bdb02e9b785d7297997acec6e8ea874282e0ba6 cf8a42c402cac719099b2ccccebfbfd3b0722020 1dd776ad2843d17b1d7e03465813e5432410323d 2c19b051a5bbc5bbbda9888a582d803a02ee4551 98d9bceee50ba68702064dc1fb6118d7d3853fff 2f5181c06504c89263a5753ab40f4ef6383fbef7 c16ea2f44746d60522c978a5669156931360bf03 92292b1437b5da4f0080f742b79d3d11180bbde5 6cf6220d4ffe97706eda51b808cd833b866b2c25 43ad53d345b3b1ac4b7561b9405a60c514408dbb 0df26b7f1be7c2ea94b1f96b24c39ba9a8727ed4 32c93c7a59d70a7a569cca5cced48f02b0f35506 31046b5734851e03ce0d6c0d435b0c03c77e247c 17b71fadf756c321782602e0fdc0450c94808141 a6d197d8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:31:af:e8:ac:0a:e5:c3:6e:0d:6d:24:67:ad:ce:32:c6:fb:1a:fa] modulus: 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 public exponent: 10001 ] 2022-04-05 04:00:47.103  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 04:00:47.105 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 04:00:47.109 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-04-05 04:00:47.110 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 04:00:47.111  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-04-05 04:00:47.115  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 04:00:47.116  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 04:00:47.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 04:00:47.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 04:00:47.123 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 04:00:47.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 04:00:47.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 04:00:47.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 04:00:47.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 04:00:47.393  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 04:00:47.394  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 04:00:47.394 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 04:00:47.394 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 04:00:47.398  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 04:00:47.399  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 04:00:47.400 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 04:00:47.400 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 04:00:47.400 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 04:00:47.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 04:00:47.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 04:00:47.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 04:00:47.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 04:00:47.405 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 04:00:47.406 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 04:00:47.413 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 04:00:47.418 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495497344434582504885667335922071568769170334117 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 02:50:36 UTC 2022 Final Date: Sun Apr 04 02:50:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:21:5b:bf:e0:50:7b:a4:27:96:ff:bf:70:8f:a9:e0:9b:cc:dc:da] modulus: ca959e27abdfd900e242eb18bf6aad81251b45ffadebb0434a185621406134ca46a91b1742046f3bc59f84d6dad6961e789d0b10e6c76ef6423293e6971484559f426301dbdb27600d73572688588aaa0847651d8019a66fa638ddef3c904a5b3ddc850d6652d1c3945392d19c409d96fce6201a9ed6cc883c92c965708561a1f6f516c384b67f985fccc23b87466beb4584a4af6c4817ba115bf13afa537316ed7a2243b6aee1d0320ea704c347595eb79d811c1e9e0a08c8f5581c38ba6cc1f9e1c7c59084c8c372d0a14afa43e7432b85105d272fb45fc4f8e089bfc81eeffdff893bc50c0867256b0d4c6002b4a2b39ab151b784138ce73483d47309a2c9840f58c196aa5b79fe4958c22aa03c5a85554d706f93fc863e9ee7371635aa33280fc8fda592a3c694ca833338edb4873dcc16a1cb1b4502a1fe00eba35ff39365ba8fd8890a2de7f88cabff7a4186b6e1239595124814b0ca0e7ca8ca67a9eec0ffc5085c019eaad9e50857442614efe55ceee275eeec642e74f42c23cf7a47 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b60e03f75e763d5b6aedb526945c83fceb7d768 b6af0ba42cfc9a2f284d03d08edce163e0315348 d40514103fc91f1943214b82c3c2de3b9c05eba2 1d15edd04111960f5c16e52044d35e5acf88cc98 a0b5ed562fee64c723788cefbbb1c2b109b5dae2 4bdb02e9b785d7297997acec6e8ea874282e0ba6 cf8a42c402cac719099b2ccccebfbfd3b0722020 1dd776ad2843d17b1d7e03465813e5432410323d 2c19b051a5bbc5bbbda9888a582d803a02ee4551 98d9bceee50ba68702064dc1fb6118d7d3853fff 2f5181c06504c89263a5753ab40f4ef6383fbef7 c16ea2f44746d60522c978a5669156931360bf03 92292b1437b5da4f0080f742b79d3d11180bbde5 6cf6220d4ffe97706eda51b808cd833b866b2c25 43ad53d345b3b1ac4b7561b9405a60c514408dbb 0df26b7f1be7c2ea94b1f96b24c39ba9a8727ed4 32c93c7a59d70a7a569cca5cced48f02b0f35506 31046b5734851e03ce0d6c0d435b0c03c77e247c 17b71fadf756c321782602e0fdc0450c94808141 a6d197d8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:41:46:22:c9:77:5e:46:52:fc:97:d6:89:20:74:0e:6a:fb:70:d9] modulus: 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 public exponent: 10001 ] 2022-04-05 04:02:30.553  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 04:02:30.555 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 04:02:30.556 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-05 04:02:30.558 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 04:02:30.558  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-05 04:02:30.559  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 04:02:30.559  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 04:02:30.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 04:02:30.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 04:02:30.562 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 04:02:30.570 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 04:02:30.571 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 04:02:30.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 04:02:30.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 04:02:30.725  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 04:02:30.726  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 04:02:30.726 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 04:02:30.727 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 04:02:30.728  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 04:02:30.729  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 04:02:30.729 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 04:02:30.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 04:02:30.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 04:02:30.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 04:02:30.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 04:02:30.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 04:02:30.732 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 04:02:30.733 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 04:02:30.733 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 04:02:30.734 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 04:02:30.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 495497344434582504885667335922071568769170334117 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 02:50:36 UTC 2022 Final Date: Sun Apr 04 02:50:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [91:21:5b:bf:e0:50:7b:a4:27:96:ff:bf:70:8f:a9:e0:9b:cc:dc:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b60e03f75e763d5b6aedb526945c83fceb7d768 b6af0ba42cfc9a2f284d03d08edce163e0315348 d40514103fc91f1943214b82c3c2de3b9c05eba2 1d15edd04111960f5c16e52044d35e5acf88cc98 a0b5ed562fee64c723788cefbbb1c2b109b5dae2 4bdb02e9b785d7297997acec6e8ea874282e0ba6 cf8a42c402cac719099b2ccccebfbfd3b0722020 1dd776ad2843d17b1d7e03465813e5432410323d 2c19b051a5bbc5bbbda9888a582d803a02ee4551 98d9bceee50ba68702064dc1fb6118d7d3853fff 2f5181c06504c89263a5753ab40f4ef6383fbef7 c16ea2f44746d60522c978a5669156931360bf03 92292b1437b5da4f0080f742b79d3d11180bbde5 6cf6220d4ffe97706eda51b808cd833b866b2c25 43ad53d345b3b1ac4b7561b9405a60c514408dbb 0df26b7f1be7c2ea94b1f96b24c39ba9a8727ed4 32c93c7a59d70a7a569cca5cced48f02b0f35506 31046b5734851e03ce0d6c0d435b0c03c77e247c 17b71fadf756c321782602e0fdc0450c94808141 a6d197d8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:8e:db:bf:98:79:16:f5:d1:af:48:9a:8d:8b:46:7f:d2:59:f2:e4] modulus: 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 public exponent: 10001 ]