2022-04-15 03:01:43,268 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-15 03:01:44,458 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-15 03:01:45.442  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 15, 2022 3:01:48 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 15, 2022 3:01:48 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 15, 2022 3:01:48 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 15, 2022 3:01:48 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-15 03:01:48.833 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-15 03:01:49.187  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-15 03:01:49.395  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-15 03:01:50.434 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-15 03:01:50.439 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-04-15 03:01:50.440 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-15 03:01:50.444 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-15 03:01:50.495 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-04-15 03:01:50.499 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-15 03:01:50.639 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-15 03:01:51.549 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 15, 2022 3:01:52 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-15 03:01:53.056  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 10.75 seconds (JVM running for 13.136) Apr 15, 2022 3:02:14 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-15 03:02:39.510  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-15 03:02:39.518 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-15 03:02:39.570 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-15 03:02:39.576 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-15 03:02:39.597  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-15 03:02:39.600  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-15 03:02:39.602  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-15 03:02:39.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-15 03:02:39.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 03:02:39.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-15 03:02:39.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-15 03:02:39.619 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-15 03:02:39.671 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-15 03:02:39.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 03:02:39.679 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 03:02:39.685 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 03:02:40.318  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-15 03:02:40.322  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-15 03:02:40.322 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-15 03:02:40.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 03:02:40.336  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-15 03:02:40.338  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-15 03:02:40.339 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 03:02:40.340 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 03:02:40.341 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 03:02:40.363 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 03:02:40.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 03:02:40.364 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 03:02:40.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 03:02:40.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 03:02:40.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 03:02:40.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-15 03:02:40.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 112691970963528546133302515974771998561614034905 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 15 02:59:22 UTC 2022 Final Date: Wed Apr 14 02:59:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:ef:50:91:9c:14:77:ca:a5:f1:3e:68:90:98:35:d3:71:e3:97:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1c61320ebd5d73ab46ccfc8ac1e19de4b59eae4a 7d197e47a694654e21ba2db3a72ad6c25d32947d 5a09f5b3261dc1b7372ceea0c244ab7babfa5007 88c4888cffc1995106f1ecf2755ff461b3c3ee48 7e044ee3f6c5f7619ddf45ba68053c696d19c2de f1fde570b6259d3c6bf65656578993b3f9ddda34 906f1be8579002233c29e8b37c98a47c558b02aa 74cdac4ca8442776f0a3d36d12e716448fc3fb7c 7ff00d18ff882701f126cceefdf566e5e3ff5bfa d456c36984606cecf5dc323622b13d242a3e3605 0eb3fcf5fb84360d6d89ebf766eff5977d03bbc3 b83b62212dd471482453556f720fc3576864efa2 7b3161f130c391e25c206f830b068a0f87d4f6b1 c2f11092b6d1a01d90425603f9a0a0691d4aa1d8 dfea10d9f0a643ebb8e77654524560264bf2bf3e bf9b81f5ece21dd5f8ec492f4704f114cb4710b5 4198544de74c28e3825cf189ef67ad7d856b7639 698839d711b89a1b5cfc7fccccd47e1061c8e1a3 2236e711442f73daf30770ad691d25af930b8687 b85d018c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:96:d4:c2:0e:38:93:e6:c8:68:f7:92:e4:a3:49:59:20:a1:c7:c7] modulus: d509a119d9c2604e12dd4f4919e854cfb40231bdeb8153f51609756605a9093485814f52177eddf7bb3e1805eb522f2b3e2cc9d1e2cc68323330024a5d0d17f7ea82a42b63422992b3a9fc2195bb726d2bba6e7c4c49bd7ece33223ac0590565cb34468c43406193906330ba51f37bf53fa8c03510c08c577d9a1596da3a2cdec989bdc341a26b1b1c354c74ae84705059ac6970434b8bd6171d149ed7d60a6806f5b1221b59423a8c2bff2295ca61736221d80c48f47c9b6681357aaa417bce5c2b9051ed390b736462ac84c21c12946ba37d8df3ff64fb6b58e676adadd0d9e47728790e53fb5e1759dfeaaae95bcbb471f9b177349258c664e3408a475fd7 public exponent: 10001 ] 2022-04-15 04:15:33.745  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-15 04:15:33.747 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-15 04:15:33.754 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-15 04:15:33.756 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-15 04:15:33.756  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-15 04:15:33.757  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-15 04:15:33.762  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-15 04:15:33.762 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-15 04:15:33.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-15 04:15:33.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-15 04:15:33.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-15 04:15:33.793 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:15:33.793 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:15:33.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:15:33.992  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-15 04:15:33.994  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-15 04:15:33.994 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-15 04:15:33.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:15:33.998  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-15 04:15:33.998  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-15 04:15:33.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:15:33.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:15:33.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:15:34.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:15:34.001 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:15:34.001 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:15:34.003 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:15:34.003 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:15:34.003 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:15:34.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-15 04:15:34.016 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 112691970963528546133302515974771998561614034905 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 15 02:59:22 UTC 2022 Final Date: Wed Apr 14 02:59:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:ef:50:91:9c:14:77:ca:a5:f1:3e:68:90:98:35:d3:71:e3:97:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1c61320ebd5d73ab46ccfc8ac1e19de4b59eae4a 7d197e47a694654e21ba2db3a72ad6c25d32947d 5a09f5b3261dc1b7372ceea0c244ab7babfa5007 88c4888cffc1995106f1ecf2755ff461b3c3ee48 7e044ee3f6c5f7619ddf45ba68053c696d19c2de f1fde570b6259d3c6bf65656578993b3f9ddda34 906f1be8579002233c29e8b37c98a47c558b02aa 74cdac4ca8442776f0a3d36d12e716448fc3fb7c 7ff00d18ff882701f126cceefdf566e5e3ff5bfa d456c36984606cecf5dc323622b13d242a3e3605 0eb3fcf5fb84360d6d89ebf766eff5977d03bbc3 b83b62212dd471482453556f720fc3576864efa2 7b3161f130c391e25c206f830b068a0f87d4f6b1 c2f11092b6d1a01d90425603f9a0a0691d4aa1d8 dfea10d9f0a643ebb8e77654524560264bf2bf3e bf9b81f5ece21dd5f8ec492f4704f114cb4710b5 4198544de74c28e3825cf189ef67ad7d856b7639 698839d711b89a1b5cfc7fccccd47e1061c8e1a3 2236e711442f73daf30770ad691d25af930b8687 b85d018c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:a3:4c:52:c3:d0:85:5d:76:45:a3:ec:32:99:55:44:a3:84:71:47] modulus: 9700483d713049b372df50551a655a2ec17ed02ed55f5d746de19a764facf4c49a7ef6a83fc481c2ae462dc4b0baf18414386e820eef822272e81e501f9524395f97d6decf9b34b1b7cedf053280608f416a6365622f01f86739c16d7168189a8bda24ae9f46d85c3e68bae267cdd3a013baff072d053adea8718206b3e87d1fae90e99612c01cd5daf0803d50db362dfbdb6a28e47b215fc3f47d3e867b81b4628db0709b52193e37bb7a1e2e3a73f404326cf64df565390422b11f57b8eb7f9727efb130422c5ed6bb7aa54fa98b925589b5c5e2cb799c4a84e07217f298668cb1eab79cbd06f6518bda08f06dc6cba7e604629e790bd35ff6f0983bee35ef public exponent: 10001 ] 2022-04-15 04:16:41.676  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-15 04:16:41.679 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-15 04:16:41.681 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-15 04:16:41.683 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-15 04:16:41.684  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-15 04:16:41.686  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-15 04:16:41.687  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-15 04:16:41.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-15 04:16:41.690 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-15 04:16:41.692 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-15 04:16:41.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-15 04:16:41.717 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:16:41.717 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:16:41.718 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:16:41.875  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-15 04:16:41.876  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-15 04:16:41.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-15 04:16:41.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:16:41.884  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-15 04:16:41.885  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-15 04:16:41.886 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:16:41.886 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:16:41.886 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:16:41.887 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:16:41.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:16:41.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:16:41.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:16:41.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:16:41.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:16:41.892 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-15 04:16:41.896 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 112691970963528546133302515974771998561614034905 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 15 02:59:22 UTC 2022 Final Date: Wed Apr 14 02:59:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:ef:50:91:9c:14:77:ca:a5:f1:3e:68:90:98:35:d3:71:e3:97:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1c61320ebd5d73ab46ccfc8ac1e19de4b59eae4a 7d197e47a694654e21ba2db3a72ad6c25d32947d 5a09f5b3261dc1b7372ceea0c244ab7babfa5007 88c4888cffc1995106f1ecf2755ff461b3c3ee48 7e044ee3f6c5f7619ddf45ba68053c696d19c2de f1fde570b6259d3c6bf65656578993b3f9ddda34 906f1be8579002233c29e8b37c98a47c558b02aa 74cdac4ca8442776f0a3d36d12e716448fc3fb7c 7ff00d18ff882701f126cceefdf566e5e3ff5bfa d456c36984606cecf5dc323622b13d242a3e3605 0eb3fcf5fb84360d6d89ebf766eff5977d03bbc3 b83b62212dd471482453556f720fc3576864efa2 7b3161f130c391e25c206f830b068a0f87d4f6b1 c2f11092b6d1a01d90425603f9a0a0691d4aa1d8 dfea10d9f0a643ebb8e77654524560264bf2bf3e bf9b81f5ece21dd5f8ec492f4704f114cb4710b5 4198544de74c28e3825cf189ef67ad7d856b7639 698839d711b89a1b5cfc7fccccd47e1061c8e1a3 2236e711442f73daf30770ad691d25af930b8687 b85d018c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:a4:11:e2:ee:11:fc:cb:b6:6b:80:6a:f5:38:31:37:d1:f3:b7:16] modulus: d191569b412011d03730c4b824ad769f44689dbd1b84891ca397feacd6f523daae8ee317820c94e397052adf05112408e7609b2dfb37e84765b2563dd1519bd2c8565aa9ecf4bcb5290bfd79005ae10ef14d1d89d47ebeb1799e2edae5c479d459d8f932971b722e12b4020aad52b6d2228bca2bdac674c8aa4fc5355dce331c5687b22f7a086f7cc599750218ea68bf12004eb95d08b135e6b2329aba31a3de29f6094768018f4b5b272db22713b69e2ad779c5d8a2b3943f64dca952c546864ee47305ef3722ab5513d9db3c5789a661daa091d82e4df30747bf6378a1d2b1047c635027cfccd72d01a49ef710e13dd9fd184338271dd278c9cbc12622da11 public exponent: 10001 ] 2022-04-15 04:18:16.168  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-15 04:18:16.171 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-15 04:18:16.174 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-15 04:18:16.174 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-15 04:18:16.175  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-15 04:18:16.176  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-15 04:18:16.176  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-15 04:18:16.177 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-15 04:18:16.177 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-15 04:18:16.178 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-15 04:18:16.183 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-15 04:18:16.184 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:18:16.185 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:18:16.185 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:18:16.337  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-15 04:18:16.338  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-15 04:18:16.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-15 04:18:16.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:18:16.342  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-15 04:18:16.343  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-15 04:18:16.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:18:16.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:18:16.345 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:18:16.346 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:18:16.347 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:18:16.347 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:18:16.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:18:16.349 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:18:16.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:18:16.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-15 04:18:16.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 112691970963528546133302515974771998561614034905 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 15 02:59:22 UTC 2022 Final Date: Wed Apr 14 02:59:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:ef:50:91:9c:14:77:ca:a5:f1:3e:68:90:98:35:d3:71:e3:97:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1c61320ebd5d73ab46ccfc8ac1e19de4b59eae4a 7d197e47a694654e21ba2db3a72ad6c25d32947d 5a09f5b3261dc1b7372ceea0c244ab7babfa5007 88c4888cffc1995106f1ecf2755ff461b3c3ee48 7e044ee3f6c5f7619ddf45ba68053c696d19c2de f1fde570b6259d3c6bf65656578993b3f9ddda34 906f1be8579002233c29e8b37c98a47c558b02aa 74cdac4ca8442776f0a3d36d12e716448fc3fb7c 7ff00d18ff882701f126cceefdf566e5e3ff5bfa d456c36984606cecf5dc323622b13d242a3e3605 0eb3fcf5fb84360d6d89ebf766eff5977d03bbc3 b83b62212dd471482453556f720fc3576864efa2 7b3161f130c391e25c206f830b068a0f87d4f6b1 c2f11092b6d1a01d90425603f9a0a0691d4aa1d8 dfea10d9f0a643ebb8e77654524560264bf2bf3e bf9b81f5ece21dd5f8ec492f4704f114cb4710b5 4198544de74c28e3825cf189ef67ad7d856b7639 698839d711b89a1b5cfc7fccccd47e1061c8e1a3 2236e711442f73daf30770ad691d25af930b8687 b85d018c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:14:5b:bb:3d:71:f7:49:33:19:e0:f7:3b:5f:0f:9d:91:73:47:dd] modulus: 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 public exponent: 10001 ] 2022-04-15 04:19:43.562  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-15 04:19:43.567 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-15 04:19:43.572 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-15 04:19:43.573 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-15 04:19:43.575  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-15 04:19:43.576  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-15 04:19:43.579  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-15 04:19:43.580 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-15 04:19:43.580 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-15 04:19:43.581 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-15 04:19:43.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-15 04:19:43.587 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:19:43.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:19:43.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:19:43.752  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-15 04:19:43.753  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-15 04:19:43.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-15 04:19:43.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:19:43.756  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-15 04:19:43.756  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-15 04:19:43.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:19:43.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:19:43.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:19:43.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:19:43.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:19:43.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:19:43.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:19:43.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:19:43.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:19:43.761 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-15 04:19:43.764 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 112691970963528546133302515974771998561614034905 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 15 02:59:22 UTC 2022 Final Date: Wed Apr 14 02:59:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:ef:50:91:9c:14:77:ca:a5:f1:3e:68:90:98:35:d3:71:e3:97:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1c61320ebd5d73ab46ccfc8ac1e19de4b59eae4a 7d197e47a694654e21ba2db3a72ad6c25d32947d 5a09f5b3261dc1b7372ceea0c244ab7babfa5007 88c4888cffc1995106f1ecf2755ff461b3c3ee48 7e044ee3f6c5f7619ddf45ba68053c696d19c2de f1fde570b6259d3c6bf65656578993b3f9ddda34 906f1be8579002233c29e8b37c98a47c558b02aa 74cdac4ca8442776f0a3d36d12e716448fc3fb7c 7ff00d18ff882701f126cceefdf566e5e3ff5bfa d456c36984606cecf5dc323622b13d242a3e3605 0eb3fcf5fb84360d6d89ebf766eff5977d03bbc3 b83b62212dd471482453556f720fc3576864efa2 7b3161f130c391e25c206f830b068a0f87d4f6b1 c2f11092b6d1a01d90425603f9a0a0691d4aa1d8 dfea10d9f0a643ebb8e77654524560264bf2bf3e bf9b81f5ece21dd5f8ec492f4704f114cb4710b5 4198544de74c28e3825cf189ef67ad7d856b7639 698839d711b89a1b5cfc7fccccd47e1061c8e1a3 2236e711442f73daf30770ad691d25af930b8687 b85d018c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:51:53:89:37:9b:c0:23:bf:41:17:34:d4:45:85:79:52:5e:59:02] modulus: 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 public exponent: 10001 ] 2022-04-15 04:20:06.840  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-15 04:20:06.841 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-15 04:20:06.843 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-04-15 04:20:06.843 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-15 04:20:06.844  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-04-15 04:20:06.845  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-15 04:20:06.845  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-15 04:20:06.845 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-15 04:20:06.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-15 04:20:06.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-15 04:20:06.851 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-15 04:20:06.852 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:20:06.852 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:20:06.852 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:20:06.967  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-15 04:20:06.968  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-15 04:20:06.968 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-15 04:20:06.969 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:20:06.970  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-15 04:20:06.971  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-15 04:20:06.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:20:06.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:20:06.972 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:20:06.972 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:20:06.973 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:20:06.973 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:20:06.974 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:20:06.974 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:20:06.974 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:20:06.975 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-15 04:20:06.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 112691970963528546133302515974771998561614034905 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 15 02:59:22 UTC 2022 Final Date: Wed Apr 14 02:59:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:ef:50:91:9c:14:77:ca:a5:f1:3e:68:90:98:35:d3:71:e3:97:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1c61320ebd5d73ab46ccfc8ac1e19de4b59eae4a 7d197e47a694654e21ba2db3a72ad6c25d32947d 5a09f5b3261dc1b7372ceea0c244ab7babfa5007 88c4888cffc1995106f1ecf2755ff461b3c3ee48 7e044ee3f6c5f7619ddf45ba68053c696d19c2de f1fde570b6259d3c6bf65656578993b3f9ddda34 906f1be8579002233c29e8b37c98a47c558b02aa 74cdac4ca8442776f0a3d36d12e716448fc3fb7c 7ff00d18ff882701f126cceefdf566e5e3ff5bfa d456c36984606cecf5dc323622b13d242a3e3605 0eb3fcf5fb84360d6d89ebf766eff5977d03bbc3 b83b62212dd471482453556f720fc3576864efa2 7b3161f130c391e25c206f830b068a0f87d4f6b1 c2f11092b6d1a01d90425603f9a0a0691d4aa1d8 dfea10d9f0a643ebb8e77654524560264bf2bf3e bf9b81f5ece21dd5f8ec492f4704f114cb4710b5 4198544de74c28e3825cf189ef67ad7d856b7639 698839d711b89a1b5cfc7fccccd47e1061c8e1a3 2236e711442f73daf30770ad691d25af930b8687 b85d018c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:d0:20:2b:da:99:f5:dc:69:bd:82:bb:60:2a:66:34:9c:b8:c2:42] modulus: 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 public exponent: 10001 ] 2022-04-15 04:20:16.666  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-15 04:20:16.667 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-15 04:20:16.669 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-15 04:20:16.669 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-15 04:20:16.670  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-04-15 04:20:16.671  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-15 04:20:16.671  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-15 04:20:16.671 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-15 04:20:16.672 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-15 04:20:16.672 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-15 04:20:16.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-15 04:20:16.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:20:16.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:20:16.678 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:20:16.794  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-15 04:20:16.798  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-15 04:20:16.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-15 04:20:16.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:20:16.802  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-15 04:20:16.802  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-15 04:20:16.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:20:16.803 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:20:16.804 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:20:16.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:20:16.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:20:16.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:20:16.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:20:16.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:20:16.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:20:16.810 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-15 04:20:16.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 112691970963528546133302515974771998561614034905 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 15 02:59:22 UTC 2022 Final Date: Wed Apr 14 02:59:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:ef:50:91:9c:14:77:ca:a5:f1:3e:68:90:98:35:d3:71:e3:97:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1c61320ebd5d73ab46ccfc8ac1e19de4b59eae4a 7d197e47a694654e21ba2db3a72ad6c25d32947d 5a09f5b3261dc1b7372ceea0c244ab7babfa5007 88c4888cffc1995106f1ecf2755ff461b3c3ee48 7e044ee3f6c5f7619ddf45ba68053c696d19c2de f1fde570b6259d3c6bf65656578993b3f9ddda34 906f1be8579002233c29e8b37c98a47c558b02aa 74cdac4ca8442776f0a3d36d12e716448fc3fb7c 7ff00d18ff882701f126cceefdf566e5e3ff5bfa d456c36984606cecf5dc323622b13d242a3e3605 0eb3fcf5fb84360d6d89ebf766eff5977d03bbc3 b83b62212dd471482453556f720fc3576864efa2 7b3161f130c391e25c206f830b068a0f87d4f6b1 c2f11092b6d1a01d90425603f9a0a0691d4aa1d8 dfea10d9f0a643ebb8e77654524560264bf2bf3e bf9b81f5ece21dd5f8ec492f4704f114cb4710b5 4198544de74c28e3825cf189ef67ad7d856b7639 698839d711b89a1b5cfc7fccccd47e1061c8e1a3 2236e711442f73daf30770ad691d25af930b8687 b85d018c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:10:79:f4:0a:a3:5f:74:9f:64:ba:a6:57:81:bd:4f:02:ed:31:b1] modulus: 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 public exponent: 10001 ] 2022-04-15 04:20:50.290  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-15 04:20:50.291 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-15 04:20:50.293 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-04-15 04:20:50.293 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-15 04:20:50.294  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-04-15 04:20:50.294  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-15 04:20:50.295  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-15 04:20:50.295 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-15 04:20:50.296 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-15 04:20:50.296 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-15 04:20:50.302 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-15 04:20:50.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:20:50.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:20:50.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:20:50.481  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-15 04:20:50.483  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-15 04:20:50.483 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-15 04:20:50.484 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:20:50.486  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-15 04:20:50.487  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-15 04:20:50.488 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:20:50.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:20:50.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:20:50.494 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:20:50.494 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:20:50.495 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:20:50.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:20:50.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:20:50.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:20:50.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-15 04:20:50.501 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 112691970963528546133302515974771998561614034905 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 15 02:59:22 UTC 2022 Final Date: Wed Apr 14 02:59:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:ef:50:91:9c:14:77:ca:a5:f1:3e:68:90:98:35:d3:71:e3:97:e4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1c61320ebd5d73ab46ccfc8ac1e19de4b59eae4a 7d197e47a694654e21ba2db3a72ad6c25d32947d 5a09f5b3261dc1b7372ceea0c244ab7babfa5007 88c4888cffc1995106f1ecf2755ff461b3c3ee48 7e044ee3f6c5f7619ddf45ba68053c696d19c2de f1fde570b6259d3c6bf65656578993b3f9ddda34 906f1be8579002233c29e8b37c98a47c558b02aa 74cdac4ca8442776f0a3d36d12e716448fc3fb7c 7ff00d18ff882701f126cceefdf566e5e3ff5bfa d456c36984606cecf5dc323622b13d242a3e3605 0eb3fcf5fb84360d6d89ebf766eff5977d03bbc3 b83b62212dd471482453556f720fc3576864efa2 7b3161f130c391e25c206f830b068a0f87d4f6b1 c2f11092b6d1a01d90425603f9a0a0691d4aa1d8 dfea10d9f0a643ebb8e77654524560264bf2bf3e bf9b81f5ece21dd5f8ec492f4704f114cb4710b5 4198544de74c28e3825cf189ef67ad7d856b7639 698839d711b89a1b5cfc7fccccd47e1061c8e1a3 2236e711442f73daf30770ad691d25af930b8687 b85d018c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:0d:ff:04:98:55:0b:9d:4d:16:29:d6:62:8c:7a:62:dc:25:fd:47] modulus: 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 public exponent: 10001 ] 2022-04-15 04:22:35.590  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-15 04:22:35.592 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-15 04:22:35.596 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-15 04:22:35.599 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-15 04:22:35.600  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-04-15 04:22:35.605  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-15 04:22:35.605  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-15 04:22:35.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-15 04:22:35.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-15 04:22:35.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-15 04:22:35.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-15 04:22:35.616 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:22:35.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-15 04:22:35.617 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:22:35.743  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-15 04:22:35.744  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-15 04:22:35.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-15 04:22:35.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-15 04:22:35.746  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-15 04:22:35.747  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-15 04:22:35.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:22:35.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:22:35.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:22:35.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:22:35.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:22:35.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:22:35.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-15 04:22:35.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-15 04:22:35.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-15 04:22:35.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-15 04:22:35.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 112691970963528546133302515974771998561614034905 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 15 02:59:22 UTC 2022 Final Date: Wed Apr 14 02:59:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:ef:50:91:9c:14:77:ca:a5:f1:3e:68:90:98:35:d3:71:e3:97:e4] modulus: bbdb7d9c5aaaaec9008eb5a5f2ba7eaf76217876b0f531419d9f1a3dd933f1eaaabb9fd46ed156ef6edcef4e08bae1a45c6c48727875fed78254d8198916e4bd275ae5c0b80c7b8c4ea7075d7f859a451337c8f21ee1b863d906e0c0c865d1372e9d299a686bdcdc170bddc6b8c89c9a1f598d819fbf87c957216911a5ec9701c1e88faacd8649913923e1d8aa18ca1f9f590cb78c22cb42d61908895459ca503fea95f4543d9960214fef0dd77b5d3bfc768647b9b56737f093cced47ac997386a7c89eb2dc3d3e5cbe07cba91b0d9ac2558da6295b30e95c80eee6978f7efcd27526e6cc48b87fbdabcd982d024ffe4dee964be4d1d01e75e8af0ad037a0d6d93215f658cdd8ef2ac3cdef132be4500af17952a2fc014f5f7337d1db257b8e1558338498529186eaa309c9991749f9806bfc7ad2fa88a472c88f93ce6d2d139693c1adf3b4cba1988dc5eb89c3053634154306d0b9b6f1bf0491b1442a9aed25bf040c86467a2eac7d72d3643cfae794dacfea040214498633a264e7958ff1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1c61320ebd5d73ab46ccfc8ac1e19de4b59eae4a 7d197e47a694654e21ba2db3a72ad6c25d32947d 5a09f5b3261dc1b7372ceea0c244ab7babfa5007 88c4888cffc1995106f1ecf2755ff461b3c3ee48 7e044ee3f6c5f7619ddf45ba68053c696d19c2de f1fde570b6259d3c6bf65656578993b3f9ddda34 906f1be8579002233c29e8b37c98a47c558b02aa 74cdac4ca8442776f0a3d36d12e716448fc3fb7c 7ff00d18ff882701f126cceefdf566e5e3ff5bfa d456c36984606cecf5dc323622b13d242a3e3605 0eb3fcf5fb84360d6d89ebf766eff5977d03bbc3 b83b62212dd471482453556f720fc3576864efa2 7b3161f130c391e25c206f830b068a0f87d4f6b1 c2f11092b6d1a01d90425603f9a0a0691d4aa1d8 dfea10d9f0a643ebb8e77654524560264bf2bf3e bf9b81f5ece21dd5f8ec492f4704f114cb4710b5 4198544de74c28e3825cf189ef67ad7d856b7639 698839d711b89a1b5cfc7fccccd47e1061c8e1a3 2236e711442f73daf30770ad691d25af930b8687 b85d018c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:98:b4:9c:de:33:a2:6b:b0:6d:0e:dc:61:6c:27:fc:e9:05:19:cb] modulus: 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 public exponent: 10001 ]