2021-09-10 06:10:53,825 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-10 06:10:54,666 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-10 06:10:55.463  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-09-10 06:10:58.803 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-10 06:10:59.180  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-09-10 06:10:59.394  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-10 06:11:02.284  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.058 seconds (JVM running for 10.794) 2021-09-10 06:14:07.787  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-10 06:14:07.799 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-10 06:14:07.842 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-10 06:14:07.847 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 06:14:07.867  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-10 06:14:07.871  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-10 06:14:07.872  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-10 06:14:07.874 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-10 06:14:07.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 06:14:07.880 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-10 06:14:07.887 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-10 06:14:07.894 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-10 06:14:07.945 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-10 06:14:07.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 06:14:07.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 06:14:07.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 06:14:08.630  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-10 06:14:08.635  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-10 06:14:08.636 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-10 06:14:08.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 06:14:08.651  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-10 06:14:08.652  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-10 06:14:08.653 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 06:14:08.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 06:14:08.657 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 06:14:08.679 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 06:14:08.680 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 06:14:08.681 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 06:14:08.690 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 06:14:08.691 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 06:14:08.692 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 06:14:08.694 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 06:14:08.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:a8:90:fb:78:0c:c2:b3:65:7c:b4:2c:d0:39:37:a1:e5:55:6c:75] modulus: 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 public exponent: 10001 ] 2021-09-10 09:14:05.422  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-10 09:14:05.428 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-10 09:14:05.433 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-10 09:14:05.434 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:14:05.435  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-10 09:14:05.437  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-10 09:14:05.437  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-10 09:14:05.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-10 09:14:05.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-10 09:14:05.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-10 09:14:05.458 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-10 09:14:05.462 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:14:05.463 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:14:05.464 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:14:05.664  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-10 09:14:05.665  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-10 09:14:05.666 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-10 09:14:05.666 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:14:05.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-10 09:14:05.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-10 09:14:05.671 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:14:05.671 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:14:05.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:14:05.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:14:05.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:14:05.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:14:05.676 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:14:05.677 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:14:05.678 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:14:05.680 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:14:05.690 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: a2fedf1cb7e0797ef71bf840a6fd385a355d6e7d66ce1946653dadd0994d02c89bd52505296f4865797368e534b1f36cd6604de6ca888d17b8629ac857ae6811d9d05c5a79e68f257282ec20506ad45ba1e759d734e550fd56792269ccb7149ee784d79e7beb7f2cb62cbd0b50cb7416801ba04b4b68e791d1b11f004327d304c4197a9f4b53bebb1448c41df2d3938390fcd988769ff3dad73a632244c3289c48e48e6b7031cd3d98247d4e30237a287b57b166c0d0e1456a269f217872b473939db5b220434981f82307e819d1cfa5e24648c98ca1e2327e0aa5f51a7190b38f9b03a31da1fd2a4b06e64f14fca9e45e7db99b5a1c6b2cd5179994e8d4d506b16df37df2af9ed71e82947b7d76dbd4b1572fe4aceec947687199b6097c6fc724e0d579fbec464b9a2f8999f0ab8dad9ffed2aaec6b9bd22be9753ac013bfacdbdc333681707329290a244a53713d47fc0be77a2a95ed72cbf63ba63d6984c575fdad4d7ea4c222597c4f184a0f37af95dd575b295aaa3b74ad4e4c76422839 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:74:37:43:c6:9c:a0:ea:3f:28:a9:37:fb:14:99:60:69:f8:19:6e] modulus: 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 public exponent: 10001 ] 2021-09-10 09:18:02.054  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-10 09:18:02.067 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-10 09:18:02.069 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-10 09:18:02.072 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:18:02.073  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-10 09:18:02.076  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-10 09:18:02.076  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-10 09:18:02.077 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-10 09:18:02.077 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-10 09:18:02.078 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-10 09:18:02.090 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-10 09:18:02.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:18:02.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:18:02.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:18:02.261  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-10 09:18:02.262  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-10 09:18:02.263 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-10 09:18:02.263 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:18:02.266  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-10 09:18:02.266  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-10 09:18:02.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:18:02.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:18:02.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:18:02.270 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:18:02.270 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:18:02.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:18:02.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:18:02.272 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:18:02.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:18:02.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:18:02.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:68:32:04:dc:25:cc:e5:a2:c8:43:31:76:bf:14:d7:b3:52:91:2a] modulus: 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 public exponent: 10001 ] 2021-09-10 09:19:13.927  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-10 09:19:13.931 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-10 09:19:13.935 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-10 09:19:13.937 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:19:13.938  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-10 09:19:13.939  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-10 09:19:13.939  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-10 09:19:13.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-10 09:19:13.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-10 09:19:13.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-10 09:19:13.946 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-10 09:19:13.948 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:19:13.948 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:19:13.948 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:14.112  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-10 09:19:14.113  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-10 09:19:14.115 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-10 09:19:14.115 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:14.118  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-10 09:19:14.119  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-10 09:19:14.119 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:14.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:14.121 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:14.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:14.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:14.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:14.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:14.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:14.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:14.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:19:14.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: a2fedf1cb7e0797ef71bf840a6fd385a355d6e7d66ce1946653dadd0994d02c89bd52505296f4865797368e534b1f36cd6604de6ca888d17b8629ac857ae6811d9d05c5a79e68f257282ec20506ad45ba1e759d734e550fd56792269ccb7149ee784d79e7beb7f2cb62cbd0b50cb7416801ba04b4b68e791d1b11f004327d304c4197a9f4b53bebb1448c41df2d3938390fcd988769ff3dad73a632244c3289c48e48e6b7031cd3d98247d4e30237a287b57b166c0d0e1456a269f217872b473939db5b220434981f82307e819d1cfa5e24648c98ca1e2327e0aa5f51a7190b38f9b03a31da1fd2a4b06e64f14fca9e45e7db99b5a1c6b2cd5179994e8d4d506b16df37df2af9ed71e82947b7d76dbd4b1572fe4aceec947687199b6097c6fc724e0d579fbec464b9a2f8999f0ab8dad9ffed2aaec6b9bd22be9753ac013bfacdbdc333681707329290a244a53713d47fc0be77a2a95ed72cbf63ba63d6984c575fdad4d7ea4c222597c4f184a0f37af95dd575b295aaa3b74ad4e4c76422839 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:74:b8:29:d5:25:4a:44:4b:75:5e:33:eb:32:cd:2e:1f:dc:68:65] modulus: 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 public exponent: 10001 ] 2021-09-10 09:19:44.872  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-10 09:19:44.875 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-10 09:19:44.877 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-10 09:19:44.878 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:19:44.879  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-10 09:19:44.880  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-10 09:19:44.880  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-10 09:19:44.881 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-10 09:19:44.882 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-10 09:19:44.882 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-10 09:19:44.887 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-10 09:19:44.889 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:19:44.889 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:19:44.890 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:45.011  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-10 09:19:45.012  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-10 09:19:45.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-10 09:19:45.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:45.015  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-10 09:19:45.016  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-10 09:19:45.017 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:45.017 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:45.018 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:45.019 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:45.019 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:45.020 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:45.020 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:45.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:45.022 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:45.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:19:45.027 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:31:0e:66:df:dc:0d:e2:31:60:0c:d8:87:6d:0a:f0:39:e0:5c:bf] modulus: 9ad211fa5278425ea67d0d3455598f9dd9974d154311cc972d979520e234331eb4d5ceb62b6a64b2867144e1ea7f29d9ba36949c07a90146619ce7355bc351f9d50c778d25ce9b4ff626b8144749a1db5d5561f3f2597285b18ec4a42df419bad35c5835c961036d83155ab2ce1be94aad440f7d59e55d9f5e363e8aca2ba63b44015b19d9e0c9e038d4028815d330a4ca5c64859fa881277dd564e2c90acb33729dbed769231aa38f8b1effd51597b719e5137b1b707222b16c819ce7a8991448f47e7c94f9912802962fb9c72b73eb96f681e9de1f789439a695da620caf2ed9cb1ae53e416af463ea8ef2e2840121d19e8054d0373bc93889bbeea67f752d public exponent: 10001 ] 2021-09-10 09:19:55.031  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-10 09:19:55.035 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-10 09:19:55.036 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-10 09:19:55.037 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:19:55.038  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-10 09:19:55.040  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-10 09:19:55.040  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-10 09:19:55.047 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-10 09:19:55.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-10 09:19:55.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-10 09:19:55.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-10 09:19:55.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:19:55.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:19:55.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:55.177  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-10 09:19:55.178  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-10 09:19:55.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-10 09:19:55.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:19:55.181  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-10 09:19:55.184  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-10 09:19:55.186 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:55.186 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:55.187 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:55.188 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:55.189 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:55.189 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:55.190 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:19:55.191 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:19:55.191 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:19:55.193 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:19:55.211 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:89:a7:7c:fa:2b:66:28:33:1e:e4:81:fa:bb:9b:56:09:1f:db:b4] modulus: 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 public exponent: 10001 ] 2021-09-10 09:20:18.314  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-10 09:20:18.321 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-10 09:20:18.323 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-10 09:20:18.324 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:20:18.325  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-10 09:20:18.329  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-10 09:20:18.330  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-10 09:20:18.330 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-10 09:20:18.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-10 09:20:18.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-10 09:20:18.339 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-10 09:20:18.342 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:20:18.343 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:20:18.344 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:20:18.520  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-10 09:20:18.522  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-10 09:20:18.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-10 09:20:18.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:20:18.527  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-10 09:20:18.529  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-10 09:20:18.530 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:20:18.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:20:18.533 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:20:18.535 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:20:18.535 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:20:18.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:20:18.538 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:20:18.539 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:20:18.543 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:20:18.544 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:20:18.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [33:1e:2e:cf:44:45:61:34:aa:36:59:28:60:4e:0e:fa:96:8a:a5:56] modulus: abc4b05c2e873a164803685395fd36e8472b419280e2c432d8c9137412622e09ee058cc60c9bbcc79cb3d11469e394a811daa4822c97faf70f9ce6bde8d11edb855736b8b55dd9942febb0216e2a5a1fab63b060474befb7eec628d899105fb6d070f51ccca6b47c207b5592ae6aec5600e6b0fd4babc44c903b9bd753d7c0919240fa32008f2c922761b3f8683c3f9b84527d223a084be60ac344438a172e7cbe98bd9096b8f539436d80a1d347273eb876df42de8f1e07f6ed44484f242ff47726b74bcc29fc928d66596106fa3f922cc7dce8a4c6cb5fc43a3c48540d207bb9bdb271b9647f44dd778bf969cf80c9683143be815e35c71f414a96002774a5 public exponent: 10001 ] 2021-09-10 09:22:25.759  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-10 09:22:25.763 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-10 09:22:25.766 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-10 09:22:25.767 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:22:25.767  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-10 09:22:25.774  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-10 09:22:25.775  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-10 09:22:25.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-10 09:22:25.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-10 09:22:25.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-10 09:22:25.785 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-10 09:22:25.786 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:22:25.787 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:22:25.787 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:22:25.963  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-10 09:22:25.963  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-10 09:22:25.964 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-10 09:22:25.964 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:22:25.966  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-10 09:22:25.967  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-10 09:22:25.967 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:25.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:25.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:25.969 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:25.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:25.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:25.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:25.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:25.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:25.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:22:25.978 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: a2fedf1cb7e0797ef71bf840a6fd385a355d6e7d66ce1946653dadd0994d02c89bd52505296f4865797368e534b1f36cd6604de6ca888d17b8629ac857ae6811d9d05c5a79e68f257282ec20506ad45ba1e759d734e550fd56792269ccb7149ee784d79e7beb7f2cb62cbd0b50cb7416801ba04b4b68e791d1b11f004327d304c4197a9f4b53bebb1448c41df2d3938390fcd988769ff3dad73a632244c3289c48e48e6b7031cd3d98247d4e30237a287b57b166c0d0e1456a269f217872b473939db5b220434981f82307e819d1cfa5e24648c98ca1e2327e0aa5f51a7190b38f9b03a31da1fd2a4b06e64f14fca9e45e7db99b5a1c6b2cd5179994e8d4d506b16df37df2af9ed71e82947b7d76dbd4b1572fe4aceec947687199b6097c6fc724e0d579fbec464b9a2f8999f0ab8dad9ffed2aaec6b9bd22be9753ac013bfacdbdc333681707329290a244a53713d47fc0be77a2a95ed72cbf63ba63d6984c575fdad4d7ea4c222597c4f184a0f37af95dd575b295aaa3b74ad4e4c76422839 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:09:df:4f:7f:bd:e9:07:dd:78:6f:c2:35:12:2f:a5:d2:24:41:8b] modulus: 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 public exponent: 10001 ] 2021-09-10 09:22:47.024  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-10 09:22:47.026 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-10 09:22:47.027 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-10 09:22:47.028 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-10 09:22:47.029  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-10 09:22:47.030  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-10 09:22:47.030  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-10 09:22:47.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-10 09:22:47.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-10 09:22:47.032 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-10 09:22:47.040 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-10 09:22:47.041 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:22:47.041 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-10 09:22:47.042 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:22:47.166  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-10 09:22:47.167  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-10 09:22:47.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-10 09:22:47.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-10 09:22:47.169  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-10 09:22:47.170  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-10 09:22:47.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:47.171 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:47.171 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:47.172 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:47.173 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:47.173 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:47.174 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-10 09:22:47.175 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-10 09:22:47.175 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-10 09:22:47.176 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-10 09:22:47.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 565909611336654831571121046092321880716299406464 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 10 06:08:28 UTC 2021 Final Date: Wed Sep 10 06:08:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [39:be:04:52:29:cc:3e:7b:21:75:c4:6a:a0:a7:87:c9:a0:15:6b:97] modulus: a2fedf1cb7e0797ef71bf840a6fd385a355d6e7d66ce1946653dadd0994d02c89bd52505296f4865797368e534b1f36cd6604de6ca888d17b8629ac857ae6811d9d05c5a79e68f257282ec20506ad45ba1e759d734e550fd56792269ccb7149ee784d79e7beb7f2cb62cbd0b50cb7416801ba04b4b68e791d1b11f004327d304c4197a9f4b53bebb1448c41df2d3938390fcd988769ff3dad73a632244c3289c48e48e6b7031cd3d98247d4e30237a287b57b166c0d0e1456a269f217872b473939db5b220434981f82307e819d1cfa5e24648c98ca1e2327e0aa5f51a7190b38f9b03a31da1fd2a4b06e64f14fca9e45e7db99b5a1c6b2cd5179994e8d4d506b16df37df2af9ed71e82947b7d76dbd4b1572fe4aceec947687199b6097c6fc724e0d579fbec464b9a2f8999f0ab8dad9ffed2aaec6b9bd22be9753ac013bfacdbdc333681707329290a244a53713d47fc0be77a2a95ed72cbf63ba63d6984c575fdad4d7ea4c222597c4f184a0f37af95dd575b295aaa3b74ad4e4c76422839 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14c8626d99477c9153eed9cdc4e53744157ca01d 44dd116db9f7d8935ac5dd9cea10a1ddbaf388c7 6a437d80f40635ff3ef7fa2960cc6866fb3f6b71 911d36ac69e8eb2afc4ac6e4be1e796b444ed266 55c48f528de5288bbdcf90ca4ed4c5345fcd9c18 35e3c2af6030b80029ff390594de8338aed9880f 6b20cb079ddff5bd332fd7bbaad71c7bc9ac6014 12d499665447003092786c727fd1758066a0c3b1 02696a22cd8b6f567653c5c4cfd80bc0591145d1 e0d5f5b490a78b9e96b0f9427e7403f8295df784 0b5282b28459de1ac253154cd8aa2c2e6b01f2a6 7841f05d77cbb22c53d321e95d6c38b0302e0ad2 b0a0de23070bbadfa63a29fc422159e57ff37fad 7238422abce9f49ce37a1d64aa7e52cab0d8aa29 b19e7c077506bcc055cac2ad1bc09c806687d42a 8dd0cd1f8a165746dda9b24bd40269b0337c6405 342bcc3d4ce2e8257f45d354cc322dc31929b1b0 7708b12c5fda1fc3c59ec451add2c23d8d1383bc 0ec04c622b6c69b0fd76647ec171a1ac67caddf8 a8011dc6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:36:d8:77:93:2f:01:36:97:e6:e5:f7:c5:0c:9f:1f:65:f6:7c:4d] modulus: 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 public exponent: 10001 ]