2021-10-20 21:35:10,775 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-20 21:35:11,643 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-20 21:35:12.532  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-10-20 21:35:15.755 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-20 21:35:16.040  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-10-20 21:35:16.192  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-20 21:35:18.315  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.153 seconds (JVM running for 10.111) 2021-10-20 21:41:04.561  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-20 21:41:04.576 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-20 21:41:04.628 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-20 21:41:04.633 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-20 21:41:04.666  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-20 21:41:04.673  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-20 21:41:04.676  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-20 21:41:04.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-20 21:41:04.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 21:41:04.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-20 21:41:04.700 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-20 21:41:04.706 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-20 21:41:04.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-20 21:41:04.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 21:41:04.770 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 21:41:04.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 21:41:05.567  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-20 21:41:05.573  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-20 21:41:05.575 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-20 21:41:05.580 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 21:41:05.601  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-20 21:41:05.603  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-20 21:41:05.605 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 21:41:05.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 21:41:05.607 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 21:41:05.630 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 21:41:05.631 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 21:41:05.632 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 21:41:05.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 21:41:05.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 21:41:05.647 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 21:41:05.650 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-20 21:41:05.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 335084379070107289708176971253783500328524478844 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 20 21:00:49 UTC 2021 Final Date: Mon Oct 20 21:00:48 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9e:34:4c:9c:e6:47:64:0c:2f:83:38:60:ec:58:72:45:75:ec:4b:d7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 66c33ff9bb3ebf2234f6d09d3c94cd6b4868f05d 56d6da429ce198f3fda6ecf90412b128794474b3 f8d1f0e898333d7c3162ff78bcb17527fc05b01b da38d473070e427ee18e14dec15b02c51d1cd4f8 f014faecb57d590a0060798c56b264a9f71c3322 efcf97575a9dbb51657251316d67aa219296aed9 24253df776c42cc65d068e54ba480e53ccb7db2d 68e042ba11dd77abab99705494738d4010abc3ed 71ee542ca0d65b8b9c74d2ae4ce2b6f8abe953ab c9fd49eeb749899b70e360a11120d3c5bb33b00f a1243d5ebcb2cf115731d4725f635278c6a88b8f bebdc4dc9104dda01469e017ad4cc637b3ab8889 afb15c7b26032eb03e7cdc3ed98d4b6c04d4cd67 8742f0be57afa995d9b844765220088b10692c13 94a353393632dcbfb2f79ed83eaa7f718cc50c60 9a9d04271cdbe2196b89ee17900329e6aa4d8359 d9c3f099d9056544e708b2b499db689627eec2fe 5b4ce28e81221d6e2dd1a64d9ae6b719f41592ef ccacdf65ded22c06b626863dd8feb29a56f11109 57222acd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:ff:75:24:ee:1f:95:dc:b4:96:c4:24:1b:9c:37:33:9d:d7:48:51] modulus: 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 public exponent: 10001 ] 2021-10-20 22:55:41.756  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-20 22:55:41.758 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-20 22:55:41.762 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-20 22:55:41.763 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-20 22:55:41.764  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-20 22:55:41.765  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-20 22:55:41.765  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-20 22:55:41.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-20 22:55:41.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-20 22:55:41.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-20 22:55:41.775 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-20 22:55:41.778 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 22:55:41.778 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 22:55:41.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 22:55:41.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-20 22:55:41.952  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-20 22:55:41.953 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-20 22:55:41.953 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 22:55:41.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-20 22:55:41.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-20 22:55:41.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 22:55:41.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 22:55:41.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 22:55:41.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 22:55:41.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 22:55:41.960 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 22:55:41.961 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 22:55:41.962 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 22:55:41.962 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 22:55:41.964 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-20 22:55:41.970 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 335084379070107289708176971253783500328524478844 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 20 21:00:49 UTC 2021 Final Date: Mon Oct 20 21:00:48 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9e:34:4c:9c:e6:47:64:0c:2f:83:38:60:ec:58:72:45:75:ec:4b:d7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 66c33ff9bb3ebf2234f6d09d3c94cd6b4868f05d 56d6da429ce198f3fda6ecf90412b128794474b3 f8d1f0e898333d7c3162ff78bcb17527fc05b01b da38d473070e427ee18e14dec15b02c51d1cd4f8 f014faecb57d590a0060798c56b264a9f71c3322 efcf97575a9dbb51657251316d67aa219296aed9 24253df776c42cc65d068e54ba480e53ccb7db2d 68e042ba11dd77abab99705494738d4010abc3ed 71ee542ca0d65b8b9c74d2ae4ce2b6f8abe953ab c9fd49eeb749899b70e360a11120d3c5bb33b00f a1243d5ebcb2cf115731d4725f635278c6a88b8f bebdc4dc9104dda01469e017ad4cc637b3ab8889 afb15c7b26032eb03e7cdc3ed98d4b6c04d4cd67 8742f0be57afa995d9b844765220088b10692c13 94a353393632dcbfb2f79ed83eaa7f718cc50c60 9a9d04271cdbe2196b89ee17900329e6aa4d8359 d9c3f099d9056544e708b2b499db689627eec2fe 5b4ce28e81221d6e2dd1a64d9ae6b719f41592ef ccacdf65ded22c06b626863dd8feb29a56f11109 57222acd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:33:16:2a:9b:94:77:12:0d:cf:85:9c:bb:09:0c:ea:7c:f5:a2:fd] modulus: c44b74ab0c691d8a8edd71d69a0c380a7828c4ae7bcfb05da21803e165f5d23ca50187c1f8ca25f541b3141cc9f3d89ae913e998dfece550e44398faec9ad39981de58aa7ef49894df016a6673f028fd40b2874fd4828fd6abb5a9d01350c387d8a07449435a6eb8ca821a5c6a785ded4b2791b26762248c9ff89d06c2934c34c3895adc76182b3decae3e150f232f97911b797b08646567bbda0add2cfb8592594df57d96ba6cde66d5218730527527473639a832b7c3ecadcfeb22de9eff05885f2ec01e516be7ec82d677d29b7a90736c7deb8024e9f1cba5da35e38c463baeacd9427dc061f5f4177f94635922c9b17fba449470245f78614ad78ad4a88f public exponent: 10001 ] 2021-10-20 23:00:14.487  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-20 23:00:14.491 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-20 23:00:14.494 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-20 23:00:14.495 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-20 23:00:14.496  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-20 23:00:14.498  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-20 23:00:14.498  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-20 23:00:14.499 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-20 23:00:14.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-20 23:00:14.501 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-20 23:00:14.511 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-20 23:00:14.513 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 23:00:14.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 23:00:14.515 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 23:00:14.693  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-20 23:00:14.694  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-20 23:00:14.696 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-20 23:00:14.696 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 23:00:14.699  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-20 23:00:14.700  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-20 23:00:14.701 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:00:14.701 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:00:14.701 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:00:14.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:00:14.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:00:14.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:00:14.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:00:14.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:00:14.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:00:14.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-20 23:00:14.711 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 335084379070107289708176971253783500328524478844 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 20 21:00:49 UTC 2021 Final Date: Mon Oct 20 21:00:48 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9e:34:4c:9c:e6:47:64:0c:2f:83:38:60:ec:58:72:45:75:ec:4b:d7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 66c33ff9bb3ebf2234f6d09d3c94cd6b4868f05d 56d6da429ce198f3fda6ecf90412b128794474b3 f8d1f0e898333d7c3162ff78bcb17527fc05b01b da38d473070e427ee18e14dec15b02c51d1cd4f8 f014faecb57d590a0060798c56b264a9f71c3322 efcf97575a9dbb51657251316d67aa219296aed9 24253df776c42cc65d068e54ba480e53ccb7db2d 68e042ba11dd77abab99705494738d4010abc3ed 71ee542ca0d65b8b9c74d2ae4ce2b6f8abe953ab c9fd49eeb749899b70e360a11120d3c5bb33b00f a1243d5ebcb2cf115731d4725f635278c6a88b8f bebdc4dc9104dda01469e017ad4cc637b3ab8889 afb15c7b26032eb03e7cdc3ed98d4b6c04d4cd67 8742f0be57afa995d9b844765220088b10692c13 94a353393632dcbfb2f79ed83eaa7f718cc50c60 9a9d04271cdbe2196b89ee17900329e6aa4d8359 d9c3f099d9056544e708b2b499db689627eec2fe 5b4ce28e81221d6e2dd1a64d9ae6b719f41592ef ccacdf65ded22c06b626863dd8feb29a56f11109 57222acd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:2d:ca:fc:32:d3:63:3f:0d:d5:f8:4c:58:67:2b:a0:b1:ae:ee:bc] modulus: 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 public exponent: 10001 ] 2021-10-20 23:00:48.024  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-20 23:00:48.025 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-20 23:00:48.027 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-20 23:00:48.028 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-20 23:00:48.029  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-20 23:00:48.030  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-20 23:00:48.031  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-20 23:00:48.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-20 23:00:48.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-20 23:00:48.033 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-20 23:00:48.046 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-20 23:00:48.047 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 23:00:48.048 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 23:00:48.048 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 23:00:48.219  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-20 23:00:48.220  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-20 23:00:48.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-20 23:00:48.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 23:00:48.224  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-20 23:00:48.225  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-20 23:00:48.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:00:48.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:00:48.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:00:48.228 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:00:48.228 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:00:48.229 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:00:48.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:00:48.231 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:00:48.231 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:00:48.233 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-20 23:00:48.237 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 335084379070107289708176971253783500328524478844 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 20 21:00:49 UTC 2021 Final Date: Mon Oct 20 21:00:48 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9e:34:4c:9c:e6:47:64:0c:2f:83:38:60:ec:58:72:45:75:ec:4b:d7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 66c33ff9bb3ebf2234f6d09d3c94cd6b4868f05d 56d6da429ce198f3fda6ecf90412b128794474b3 f8d1f0e898333d7c3162ff78bcb17527fc05b01b da38d473070e427ee18e14dec15b02c51d1cd4f8 f014faecb57d590a0060798c56b264a9f71c3322 efcf97575a9dbb51657251316d67aa219296aed9 24253df776c42cc65d068e54ba480e53ccb7db2d 68e042ba11dd77abab99705494738d4010abc3ed 71ee542ca0d65b8b9c74d2ae4ce2b6f8abe953ab c9fd49eeb749899b70e360a11120d3c5bb33b00f a1243d5ebcb2cf115731d4725f635278c6a88b8f bebdc4dc9104dda01469e017ad4cc637b3ab8889 afb15c7b26032eb03e7cdc3ed98d4b6c04d4cd67 8742f0be57afa995d9b844765220088b10692c13 94a353393632dcbfb2f79ed83eaa7f718cc50c60 9a9d04271cdbe2196b89ee17900329e6aa4d8359 d9c3f099d9056544e708b2b499db689627eec2fe 5b4ce28e81221d6e2dd1a64d9ae6b719f41592ef ccacdf65ded22c06b626863dd8feb29a56f11109 57222acd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:c8:e3:a7:38:bd:2d:c1:3c:30:a0:ae:ac:72:af:22:f8:cf:f9:2c] modulus: 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 public exponent: 10001 ] 2021-10-20 23:01:21.550  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-20 23:01:21.552 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-20 23:01:21.554 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-20 23:01:21.555 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-20 23:01:21.555  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-20 23:01:21.556  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-20 23:01:21.557  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-20 23:01:21.557 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-20 23:01:21.558 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-20 23:01:21.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-20 23:01:21.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-20 23:01:21.572 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 23:01:21.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 23:01:21.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 23:01:21.736  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-20 23:01:21.737  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-20 23:01:21.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-20 23:01:21.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 23:01:21.739  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-20 23:01:21.740  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-20 23:01:21.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:01:21.741 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:01:21.741 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:01:21.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:01:21.743 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:01:21.743 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:01:21.744 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:01:21.744 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:01:21.744 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:01:21.745 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-20 23:01:21.749 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 335084379070107289708176971253783500328524478844 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 20 21:00:49 UTC 2021 Final Date: Mon Oct 20 21:00:48 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9e:34:4c:9c:e6:47:64:0c:2f:83:38:60:ec:58:72:45:75:ec:4b:d7] modulus: a3e6a4202a1b454211bd149b04518137d61e64149d7f197cd14989495747d565b3b86d65190bc825b2b33ebabea7677ad0bffa952292247e406b4bddf662b6f018db6a1a8e97558a819f73601aeb9eeb50e3a917adcf72905664fbd810d36d9cd85daa739f74c17c907831651dd3ef34b4ad1a4375c6aecb715144ee9319c9b9caf2b6aab1b385677aa6576ddf3bc1f4886fa587a2f24b5ec36a7cc44d661811d997d5c6ceeeb4a093c72ab07cea831bb4506721ce6f7f1d0842111d2814a4b7fc6f1eb0603d0fdeaf0192b7040a1ab24077f8fd734c60453346d3529f4ab5364477494d35049f003b69a5859a2920b83ef700eb1c60f2d50634ffb16711fd96aa16fc160fe2068106319cf1acb2f1f60c55a5fc493048bd78d83f6fdf3a3cae2a3c6a9ff141c0599cba770fe0685b736d0c02788cc50fe3274ebd5a06fc8e82b7638f72e9f60cda0fc3f5e1582987d7b89f4f6cf7a8e664988d6215d98ccb39070fa9af4f5872c8d392b12b6e741b76d83c1cfcda3b79218626e1faf0f565f9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 66c33ff9bb3ebf2234f6d09d3c94cd6b4868f05d 56d6da429ce198f3fda6ecf90412b128794474b3 f8d1f0e898333d7c3162ff78bcb17527fc05b01b da38d473070e427ee18e14dec15b02c51d1cd4f8 f014faecb57d590a0060798c56b264a9f71c3322 efcf97575a9dbb51657251316d67aa219296aed9 24253df776c42cc65d068e54ba480e53ccb7db2d 68e042ba11dd77abab99705494738d4010abc3ed 71ee542ca0d65b8b9c74d2ae4ce2b6f8abe953ab c9fd49eeb749899b70e360a11120d3c5bb33b00f a1243d5ebcb2cf115731d4725f635278c6a88b8f bebdc4dc9104dda01469e017ad4cc637b3ab8889 afb15c7b26032eb03e7cdc3ed98d4b6c04d4cd67 8742f0be57afa995d9b844765220088b10692c13 94a353393632dcbfb2f79ed83eaa7f718cc50c60 9a9d04271cdbe2196b89ee17900329e6aa4d8359 d9c3f099d9056544e708b2b499db689627eec2fe 5b4ce28e81221d6e2dd1a64d9ae6b719f41592ef ccacdf65ded22c06b626863dd8feb29a56f11109 57222acd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:2f:fd:6e:3f:43:3c:2c:26:2a:f1:9f:53:fc:3a:2b:05:2d:55:ea] modulus: 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 public exponent: 10001 ] 2021-10-20 23:03:28.875  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-20 23:03:28.878 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-20 23:03:28.880 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-20 23:03:28.881 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-20 23:03:28.881  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-20 23:03:28.882  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-20 23:03:28.884  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-20 23:03:28.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-20 23:03:28.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-20 23:03:28.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-20 23:03:28.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-20 23:03:28.897 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 23:03:28.897 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-20 23:03:28.898 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 23:03:29.093  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-20 23:03:29.094  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-20 23:03:29.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-20 23:03:29.095 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-20 23:03:29.097  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-20 23:03:29.097  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-20 23:03:29.098 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:03:29.099 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:03:29.099 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:03:29.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:03:29.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:03:29.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:03:29.101 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-20 23:03:29.102 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-20 23:03:29.102 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-20 23:03:29.103 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-20 23:03:29.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 335084379070107289708176971253783500328524478844 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Oct 20 21:00:49 UTC 2021 Final Date: Mon Oct 20 21:00:48 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9e:34:4c:9c:e6:47:64:0c:2f:83:38:60:ec:58:72:45:75:ec:4b:d7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 66c33ff9bb3ebf2234f6d09d3c94cd6b4868f05d 56d6da429ce198f3fda6ecf90412b128794474b3 f8d1f0e898333d7c3162ff78bcb17527fc05b01b da38d473070e427ee18e14dec15b02c51d1cd4f8 f014faecb57d590a0060798c56b264a9f71c3322 efcf97575a9dbb51657251316d67aa219296aed9 24253df776c42cc65d068e54ba480e53ccb7db2d 68e042ba11dd77abab99705494738d4010abc3ed 71ee542ca0d65b8b9c74d2ae4ce2b6f8abe953ab c9fd49eeb749899b70e360a11120d3c5bb33b00f a1243d5ebcb2cf115731d4725f635278c6a88b8f bebdc4dc9104dda01469e017ad4cc637b3ab8889 afb15c7b26032eb03e7cdc3ed98d4b6c04d4cd67 8742f0be57afa995d9b844765220088b10692c13 94a353393632dcbfb2f79ed83eaa7f718cc50c60 9a9d04271cdbe2196b89ee17900329e6aa4d8359 d9c3f099d9056544e708b2b499db689627eec2fe 5b4ce28e81221d6e2dd1a64d9ae6b719f41592ef ccacdf65ded22c06b626863dd8feb29a56f11109 57222acd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f7:39:97:2f:bf:c8:ea:12:3a:50:b5:79:39:e6:c1:5e:48:13:e0:67] modulus: 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 public exponent: 10001 ]