2021-11-04 10:18:56,157 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-04 10:18:56,993 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-04 10:18:57.896  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-04 10:19:01.517 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-04 10:19:01.764  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-04 10:19:01.930  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-04 10:19:05.287  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.797 seconds (JVM running for 11.889) 2021-11-04 10:20:39.798  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 10:20:39.815 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 10:20:39.881 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-04 10:20:39.888 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 10:20:39.919  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-04 10:20:39.928  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 10:20:39.930  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 10:20:39.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 10:20:39.936 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 10:20:39.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 10:20:39.956 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 10:20:39.963 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 10:20:40.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 10:20:40.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 10:20:40.036 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 10:20:40.042 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 10:20:40.741  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 10:20:40.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 10:20:40.747 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 10:20:40.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 10:20:40.759  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 10:20:40.761  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 10:20:40.762 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 10:20:40.762 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 10:20:40.763 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 10:20:40.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 10:20:40.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 10:20:40.780 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 10:20:40.787 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 10:20:40.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 10:20:40.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 10:20:40.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 10:20:40.826 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:28:2a:60:9c:8e:d8:53:65:89:31:fb:5d:fa:ab:ce:df:7b:87:76] modulus: a08aaa8471a5af2fda994df67789ad8e6c68bfa6dd8b6d29f3473eb3d63af37f72ce6a0107b1b9e52aa599c3ae27dbc5a7e5e19972dce70613478ccba6c4e9670df06292fbd98e249a06158f1d327b1fd10ff5c2d694cec336b843cd19795f8dd98f9780974d6adbaa9b9b1b897c9c07276e181e3b980fd2694b47d7976266148522aa489807fb4caa2408806f1f3cfe296b2483f45842744981cca34c99e6c573527ca7401c17950c2ce5cdc9beb7c4c782e6e1765b047fa98d130018ee9c58e51bea5a175e76f96aa34b99e247fbba636d64ae14d5aa0a9035726d6d9ad3e6cb90c191dc7c3c3a1cbff8445b963fc2b7428796ab10996c04221a1f90479957 public exponent: 10001 ] 2021-11-04 12:16:37.217  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:16:37.221 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:16:37.226 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-04 12:16:37.228 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:16:37.229  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-04 12:16:37.230  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:16:37.231  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:16:37.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:16:37.233 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:16:37.233 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:16:37.241 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:16:37.243 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:16:37.243 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:16:37.244 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:16:37.446  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:16:37.448  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:16:37.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:16:37.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:16:37.455  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:16:37.456  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:16:37.457 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:16:37.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:16:37.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:16:37.461 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:16:37.462 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:16:37.463 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:16:37.464 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:16:37.465 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:16:37.466 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:16:37.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:16:37.476 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:62:42:d5:33:bf:6f:b3:7b:ff:c8:14:e4:b9:aa:5d:96:dc:f9:10] modulus: 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 public exponent: 10001 ] 2021-11-04 12:18:42.001  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:18:42.004 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:18:42.006 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-04 12:18:42.008 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:18:42.008  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-04 12:18:42.009  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:18:42.010  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:18:42.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:18:42.011 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:18:42.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:18:42.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:18:42.022 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:18:42.022 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:18:42.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:18:42.187  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:18:42.188  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:18:42.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:18:42.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:18:42.193  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:18:42.193  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:18:42.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:18:42.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:18:42.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:18:42.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:18:42.198 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:18:42.199 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:18:42.200 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:18:42.201 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:18:42.201 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:18:42.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:18:42.211 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:76:4b:50:c1:23:bf:47:51:7d:4c:81:54:94:c0:4f:72:b8:4c:88] modulus: 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 public exponent: 10001 ] 2021-11-04 12:20:17.178  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:20:17.182 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:20:17.196 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-04 12:20:17.198 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:20:17.199  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-04 12:20:17.200  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:20:17.201  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:20:17.201 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:20:17.202 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:20:17.203 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:20:17.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:20:17.217 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:20:17.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:20:17.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:20:17.419  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:20:17.421  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:20:17.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:20:17.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:20:17.426  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:20:17.427  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:20:17.428 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:20:17.428 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:20:17.429 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:20:17.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:20:17.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:20:17.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:20:17.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:20:17.432 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:20:17.433 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:20:17.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:20:17.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:b2:0b:f7:3f:1e:e4:ff:a8:9b:21:81:78:06:a2:94:e3:9c:50:0b] modulus: b814b336f7aec56ac53706ea02ca354a7c02a44c4281a1a867465e4e037e42bea236318441f3c2aa39a88bfb2c443ec2fa01a693581e635829f704d16d8181c49bb0e9cf453bf19b5b32f5e2f3e5cb00736762f9d6e010707d25fdb033d965da8114dedade9a95a550770e77efe6f311545be92bb562ce25e8c2f0660cc737a69efb186a8ac0485bc2935ce4ba3a02ba2a667f5f96d59114c8c27014b8f69fa4e412fd3aec30a4cd14a22bce77ca20f25160b6c25b36bd3233174aed957a290c9396dceeddeb302503618cb39cea41db3541b730e93225b6fb8470d890333f700c9a30061d54a365220fa8cc51222b05a191e9c964eed6c2c0eef84913500615 public exponent: 10001 ] 2021-11-04 12:21:11.280  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:21:11.284 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:21:11.291 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-04 12:21:11.293 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:21:11.293  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-04 12:21:11.295  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:21:11.296  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:21:11.297 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:21:11.297 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:21:11.298 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:21:11.307 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:21:11.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:21:11.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:21:11.309 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:21:11.489  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:21:11.490  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:21:11.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:21:11.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:21:11.493  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:21:11.495  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:21:11.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:21:11.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:21:11.497 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:21:11.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:21:11.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:21:11.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:21:11.500 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:21:11.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:21:11.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:21:11.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:21:11.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: af087fd92e26b4d94c3873563075ae4def0fc0068bad882a65b5fe0cd3d665e00a258402cc6abffdf07483b8d954ab43f321093279fa78b43bacfc597f9dcad41c14928d2bd58b18aba9d3b944e1fefbef5b42021483d1a19a33757dccf7056e0e14a3628dde8416608fe5473a0dab525ba13d0f5d77afc9c57e08e3db4deaa051c6390007025125dd945e7d146f882de92688e2cdec83fc62fd22d0f410225c17118e4525043a6e8a809a440904e44224933416a47794733e6db5507865cd3ecec44f488a1b0d56e7772becca5852b9100f37b10db875e3302d86eb8724c72849bb9061c9f240f64cc59bf57f38b912177bd72b01e0155fefd4225da391972dfe3c0b8e7fdaabf45c3486c2a0731d5474180a98714ae777c054c043d42b88a553165a97fa1257c2533c178452d58219bb8b4fd1351fa19e8ca9d6656f8b841cdc4c9886d4d9b041e590bcba1376398a5badd4a1b413921b0d6e5a63f9c1fc1386958f8dc71c8fc172a17b786f400ef08618bc25a04e34fde2b5754eb4d58cab public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fc:2e:45:91:ed:5e:8c:31:95:7a:3b:8d:99:1f:37:76:bf:3e:bc:f3] modulus: c2582982acd6acba2944c6e34d1eaf7d316e14bde638d06a2c990980b6098214aa009a65fc607c529cd11f68a751026cbd803710a6c7c69233f18c7c84a59f6136049b3e3878b612aa080e00f8fbf707956ef3b9b3852d08fbd48413ee1dd02d03cbb91781fc173d61cbfee3dbaa78983c116dc596dd84299554dca3907ae2727e017e5a5665d62c2a30f7cf2b6a51616aa5859c6a0961c3380efe552708c87cbe2c9ad70682aedeb2cfadaf148e9b7470caa8186dd1f7ba6a740023607d4077bfffcde889fe69759884750e79f7202f7e3cbf25a27b64ec0070d19600d7ddf3a760f867154da97219964d39eb81dac35705816de7c6e099b3a56b948c28403b public exponent: 10001 ] 2021-11-04 12:21:42.945  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:21:42.947 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:21:42.949 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-04 12:21:42.949 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:21:42.950  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-04 12:21:42.951  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:21:42.952  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:21:42.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:21:42.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:21:42.954 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:21:42.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:21:42.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:21:42.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:21:42.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:21:43.082  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:21:43.083  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:21:43.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:21:43.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:21:43.086  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:21:43.086  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:21:43.087 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:21:43.087 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:21:43.088 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:21:43.088 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:21:43.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:21:43.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:21:43.090 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:21:43.090 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:21:43.091 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:21:43.092 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:21:43.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: af087fd92e26b4d94c3873563075ae4def0fc0068bad882a65b5fe0cd3d665e00a258402cc6abffdf07483b8d954ab43f321093279fa78b43bacfc597f9dcad41c14928d2bd58b18aba9d3b944e1fefbef5b42021483d1a19a33757dccf7056e0e14a3628dde8416608fe5473a0dab525ba13d0f5d77afc9c57e08e3db4deaa051c6390007025125dd945e7d146f882de92688e2cdec83fc62fd22d0f410225c17118e4525043a6e8a809a440904e44224933416a47794733e6db5507865cd3ecec44f488a1b0d56e7772becca5852b9100f37b10db875e3302d86eb8724c72849bb9061c9f240f64cc59bf57f38b912177bd72b01e0155fefd4225da391972dfe3c0b8e7fdaabf45c3486c2a0731d5474180a98714ae777c054c043d42b88a553165a97fa1257c2533c178452d58219bb8b4fd1351fa19e8ca9d6656f8b841cdc4c9886d4d9b041e590bcba1376398a5badd4a1b413921b0d6e5a63f9c1fc1386958f8dc71c8fc172a17b786f400ef08618bc25a04e34fde2b5754eb4d58cab public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:0c:f0:29:b4:26:ff:36:be:68:6b:11:66:d1:04:b4:92:d0:5d:c8] modulus: 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 public exponent: 10001 ] 2021-11-04 12:22:16.866  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:22:16.869 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:22:16.873 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-04 12:22:16.874 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:22:16.874  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-04 12:22:16.875  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:22:16.875  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:22:16.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:22:16.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:22:16.877 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:22:16.882 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:22:16.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:22:16.884 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:22:16.884 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:22:17.044  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:22:17.045  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:22:17.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:22:17.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:22:17.047  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:22:17.048  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:22:17.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:22:17.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:22:17.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:22:17.050 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:22:17.050 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:22:17.051 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:22:17.052 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:22:17.052 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:22:17.052 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:22:17.054 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:22:17.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:90:1b:e8:74:b0:f1:ee:7c:1b:94:8a:52:a1:fa:24:c7:3f:49:2b] modulus: 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 public exponent: 10001 ] 2021-11-04 12:22:50.586  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:22:50.587 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:22:50.590 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-04 12:22:50.590 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:22:50.591  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-04 12:22:50.591  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:22:50.592  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:22:50.592 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:22:50.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:22:50.593 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:22:50.598 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:22:50.599 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:22:50.599 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:22:50.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:22:50.740  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:22:50.741  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:22:50.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:22:50.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:22:50.744  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:22:50.744  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:22:50.745 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:22:50.745 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:22:50.745 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:22:50.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:22:50.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:22:50.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:22:50.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:22:50.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:22:50.748 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:22:50.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:22:50.752 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: af087fd92e26b4d94c3873563075ae4def0fc0068bad882a65b5fe0cd3d665e00a258402cc6abffdf07483b8d954ab43f321093279fa78b43bacfc597f9dcad41c14928d2bd58b18aba9d3b944e1fefbef5b42021483d1a19a33757dccf7056e0e14a3628dde8416608fe5473a0dab525ba13d0f5d77afc9c57e08e3db4deaa051c6390007025125dd945e7d146f882de92688e2cdec83fc62fd22d0f410225c17118e4525043a6e8a809a440904e44224933416a47794733e6db5507865cd3ecec44f488a1b0d56e7772becca5852b9100f37b10db875e3302d86eb8724c72849bb9061c9f240f64cc59bf57f38b912177bd72b01e0155fefd4225da391972dfe3c0b8e7fdaabf45c3486c2a0731d5474180a98714ae777c054c043d42b88a553165a97fa1257c2533c178452d58219bb8b4fd1351fa19e8ca9d6656f8b841cdc4c9886d4d9b041e590bcba1376398a5badd4a1b413921b0d6e5a63f9c1fc1386958f8dc71c8fc172a17b786f400ef08618bc25a04e34fde2b5754eb4d58cab public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:6c:9d:bd:cd:68:67:b9:17:b7:db:27:09:0c:98:07:d1:bf:a8:7f] modulus: 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 public exponent: 10001 ] 2021-11-04 12:24:03.687  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:24:03.690 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:24:03.695 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-04 12:24:03.696 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:24:03.697  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-04 12:24:03.698  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:24:03.699  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:24:03.700 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:24:03.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:24:03.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:24:03.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:24:03.712 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:24:03.712 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:24:03.713 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:24:03.875  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:24:03.875  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:24:03.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:24:03.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:24:03.877  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:24:03.878  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:24:03.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:24:03.879 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:24:03.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:24:03.886 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:24:03.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:24:03.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:24:03.889 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:24:03.892 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:24:03.893 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:24:03.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:24:03.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bf:8b:31:f2:fb:7e:6b:74:ef:cb:eb:48:c4:15:8e:60:77:00:cc:bd] modulus: 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 public exponent: 10001 ] 2021-11-04 12:36:16.616  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:36:16.619 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:36:16.621 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-04 12:36:16.623 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:36:16.624  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-04 12:36:16.625  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:36:16.625  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:36:16.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:36:16.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:36:16.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:36:16.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:36:16.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:36:16.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:36:16.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:36:16.829  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:36:16.830  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:36:16.831 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:36:16.831 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:36:16.833  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:36:16.833  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:36:16.834 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:36:16.834 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:36:16.834 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:36:16.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:36:16.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:36:16.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:36:16.837 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:36:16.837 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:36:16.837 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:36:16.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:36:16.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:bf:48:01:70:40:54:b5:25:72:f9:3c:88:06:37:10:0f:67:c9:b1] modulus: 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 public exponent: 10001 ] 2021-11-04 12:38:32.823  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:38:32.825 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:38:32.828 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-04 12:38:32.828 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:38:32.829  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-04 12:38:32.829  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:38:32.830  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:38:32.830 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:38:32.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:38:32.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:38:32.837 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:38:32.838 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:38:32.838 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:38:32.838 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:38:32.989  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:38:32.990  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:38:32.990 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:38:32.991 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:38:32.992  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:38:32.992  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:38:32.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:38:32.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:38:32.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:38:32.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:38:32.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:38:32.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:38:32.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:38:32.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:38:32.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:38:32.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:38:33.001 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:a2:ff:37:0d:62:f8:80:86:3d:53:a3:0e:0c:e2:4f:30:b0:e5:22] modulus: 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 public exponent: 10001 ] 2021-11-04 12:40:46.159  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:40:46.161 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:40:46.164 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-04 12:40:46.165 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:40:46.166  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-04 12:40:46.166  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:40:46.167  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:40:46.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:40:46.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:40:46.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:40:46.173 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:40:46.174 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:40:46.175 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:40:46.175 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:40:46.368  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:40:46.369  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:40:46.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:40:46.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:40:46.372  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:40:46.373  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:40:46.373 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:40:46.373 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:40:46.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:40:46.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:40:46.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:40:46.375 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:40:46.376 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:40:46.376 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:40:46.376 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:40:46.377 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:40:46.380 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: af087fd92e26b4d94c3873563075ae4def0fc0068bad882a65b5fe0cd3d665e00a258402cc6abffdf07483b8d954ab43f321093279fa78b43bacfc597f9dcad41c14928d2bd58b18aba9d3b944e1fefbef5b42021483d1a19a33757dccf7056e0e14a3628dde8416608fe5473a0dab525ba13d0f5d77afc9c57e08e3db4deaa051c6390007025125dd945e7d146f882de92688e2cdec83fc62fd22d0f410225c17118e4525043a6e8a809a440904e44224933416a47794733e6db5507865cd3ecec44f488a1b0d56e7772becca5852b9100f37b10db875e3302d86eb8724c72849bb9061c9f240f64cc59bf57f38b912177bd72b01e0155fefd4225da391972dfe3c0b8e7fdaabf45c3486c2a0731d5474180a98714ae777c054c043d42b88a553165a97fa1257c2533c178452d58219bb8b4fd1351fa19e8ca9d6656f8b841cdc4c9886d4d9b041e590bcba1376398a5badd4a1b413921b0d6e5a63f9c1fc1386958f8dc71c8fc172a17b786f400ef08618bc25a04e34fde2b5754eb4d58cab public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:20:4d:5c:83:38:50:d0:c1:e5:0b:2d:9b:44:53:6d:77:cb:ee:c2] modulus: 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 public exponent: 10001 ] 2021-11-04 12:41:17.979  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:41:17.981 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:41:17.983 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-04 12:41:17.984 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:41:17.985  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-04 12:41:17.985  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:41:17.986  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:41:17.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:41:17.987 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:41:17.987 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:41:17.993 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:41:17.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:41:17.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:41:17.995 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:41:18.105  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:41:18.106  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:41:18.106 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:41:18.107 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:41:18.109  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:41:18.109  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:41:18.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:41:18.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:41:18.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:41:18.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:41:18.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:41:18.112 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:41:18.113 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:41:18.113 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:41:18.114 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:41:18.114 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:41:18.117 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:2e:b8:ef:33:f6:dc:cd:e0:cd:bd:84:04:12:a3:ae:5b:58:8b:78] modulus: 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 public exponent: 10001 ] 2021-11-04 12:41:51.618  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:41:51.620 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:41:51.622 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-04 12:41:51.622 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:41:51.623  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-04 12:41:51.623  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:41:51.624  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:41:51.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:41:51.625 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:41:51.626 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:41:51.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:41:51.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:41:51.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:41:51.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:41:51.772  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:41:51.773  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:41:51.773 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:41:51.774 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:41:51.775  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:41:51.775  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:41:51.775 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:41:51.776 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:41:51.776 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:41:51.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:41:51.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:41:51.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:41:51.778 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:41:51.778 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:41:51.778 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:41:51.779 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:41:51.782 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:2b:7f:d7:e7:93:06:43:4a:25:e1:55:cb:c6:f0:12:43:eb:8d:73] modulus: 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 public exponent: 10001 ] 2021-11-04 12:43:39.235  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:43:39.237 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:43:39.239 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-04 12:43:39.240 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:43:39.240  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-04 12:43:39.241  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:43:39.241  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:43:39.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:43:39.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:43:39.243 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:43:39.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:43:39.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:43:39.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:43:39.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:43:39.390  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:43:39.391  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:43:39.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:43:39.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:43:39.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:43:39.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:43:39.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:43:39.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:43:39.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:43:39.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:43:39.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:43:39.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:43:39.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:43:39.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:43:39.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:43:39.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:43:39.402 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:33:78:9c:07:bf:b2:05:98:88:eb:9e:1d:c8:0c:de:65:be:71:8d] modulus: a9f31c1fa3f0bc1c65459838c4d19fc92e58bda4987c708e21378543304585528c56fe7cbb627790e31e39158a3314678b3dbc5ce7cd4e059221d409ba14f6281f7042d1a01cf2e87d5bffd56557424f16a16206608d5f62007e1e8914c1de5f3dbb91f8539871136be2c8a0422a98861e595edf3b5a0efffc72604d46d7c64bbbdbb89fe3012faf440826efeef5245578b3788290518867e4f129799b15e91ba881fdc43a81df33d3781fcd8f505472e8130453d4c36dc020c06fdd22c76aa3680022e51a1599216be39229b721b0608a143eeea132f67daa5fc36d7e98dd1fb6667c0a0c30d7eb4f5180fb592155b77b0d4ce4994386ae218ee4d039c67707 public exponent: 10001 ] 2021-11-04 12:46:13.014  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:46:13.016 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:46:13.018 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-04 12:46:13.019 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:46:13.019  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-04 12:46:13.020  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:46:13.020  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:46:13.021 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:46:13.021 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:46:13.021 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:46:13.026 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:46:13.027 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:46:13.027 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:46:13.028 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:46:13.182  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:46:13.183  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:46:13.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:46:13.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:46:13.185  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:46:13.185  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:46:13.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:46:13.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:46:13.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:46:13.187 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:46:13.187 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:46:13.187 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:46:13.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:46:13.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:46:13.188 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:46:13.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:46:13.193 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: af087fd92e26b4d94c3873563075ae4def0fc0068bad882a65b5fe0cd3d665e00a258402cc6abffdf07483b8d954ab43f321093279fa78b43bacfc597f9dcad41c14928d2bd58b18aba9d3b944e1fefbef5b42021483d1a19a33757dccf7056e0e14a3628dde8416608fe5473a0dab525ba13d0f5d77afc9c57e08e3db4deaa051c6390007025125dd945e7d146f882de92688e2cdec83fc62fd22d0f410225c17118e4525043a6e8a809a440904e44224933416a47794733e6db5507865cd3ecec44f488a1b0d56e7772becca5852b9100f37b10db875e3302d86eb8724c72849bb9061c9f240f64cc59bf57f38b912177bd72b01e0155fefd4225da391972dfe3c0b8e7fdaabf45c3486c2a0731d5474180a98714ae777c054c043d42b88a553165a97fa1257c2533c178452d58219bb8b4fd1351fa19e8ca9d6656f8b841cdc4c9886d4d9b041e590bcba1376398a5badd4a1b413921b0d6e5a63f9c1fc1386958f8dc71c8fc172a17b786f400ef08618bc25a04e34fde2b5754eb4d58cab public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:95:03:44:7b:bb:14:e3:c8:6b:3f:c0:25:a6:fb:6f:91:20:eb:3e] modulus: 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 public exponent: 10001 ] 2021-11-04 12:50:04.217  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:50:04.221 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:50:04.223 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-04 12:50:04.224 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:50:04.225  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-04 12:50:04.226  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:50:04.226  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:50:04.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:50:04.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:50:04.229 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:50:04.238 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:50:04.239 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:50:04.240 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:50:04.240 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:50:04.402  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:50:04.403  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:50:04.403 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:50:04.404 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:50:04.405  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:50:04.406  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:50:04.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:50:04.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:50:04.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:50:04.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:50:04.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:50:04.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:50:04.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:50:04.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:50:04.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:50:04.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:50:04.415 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:62:fd:01:02:8f:7b:75:9c:85:84:2e:42:90:d5:9f:3f:7d:90:90] modulus: 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 public exponent: 10001 ] 2021-11-04 12:50:36.585  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:50:36.587 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:50:36.590 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-04 12:50:36.591 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:50:36.592  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-04 12:50:36.592  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:50:36.593  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:50:36.593 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:50:36.593 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:50:36.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:50:36.598 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:50:36.599 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:50:36.599 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:50:36.600 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:50:36.751  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:50:36.752  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:50:36.752 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:50:36.752 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:50:36.754  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:50:36.754  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:50:36.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:50:36.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:50:36.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:50:36.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:50:36.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:50:36.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:50:36.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:50:36.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:50:36.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:50:36.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:50:36.764 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:50:60:6c:35:f0:21:5b:a7:a3:76:3b:e0:78:dd:48:fe:41:f6:da] modulus: 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 public exponent: 10001 ] 2021-11-04 12:51:07.107  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:51:07.110 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:51:07.112 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-04 12:51:07.113 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:51:07.114  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-04 12:51:07.115  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:51:07.115  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:51:07.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:51:07.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:51:07.117 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:51:07.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:51:07.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:51:07.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:51:07.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:51:07.258  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:51:07.259  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:51:07.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:51:07.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:51:07.261  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:51:07.262  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:51:07.262 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:51:07.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:51:07.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:51:07.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:51:07.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:51:07.265 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:51:07.267 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:51:07.267 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:51:07.267 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:51:07.268 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:51:07.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:5a:5a:a4:4f:50:fb:80:f2:da:09:1e:60:3b:51:36:b1:d1:e7:79] modulus: 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 public exponent: 10001 ] 2021-11-04 12:52:54.223  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-04 12:52:54.226 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-04 12:52:54.228 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-04 12:52:54.229 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-04 12:52:54.230  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-04 12:52:54.231  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-04 12:52:54.231  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-04 12:52:54.231 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-04 12:52:54.232 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-04 12:52:54.233 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-04 12:52:54.244 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-04 12:52:54.249 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:52:54.250 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-04 12:52:54.251 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:52:54.400  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-04 12:52:54.407  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-04 12:52:54.408 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-04 12:52:54.408 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-04 12:52:54.411  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-04 12:52:54.411  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-04 12:52:54.412 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:52:54.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:52:54.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:52:54.417 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:52:54.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:52:54.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:52:54.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-04 12:52:54.420 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-04 12:52:54.420 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-04 12:52:54.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-04 12:52:54.431 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 725649719229518674490290023126486782692089477946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 04 10:14:50 UTC 2021 Final Date: Tue Nov 04 10:14:49 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:a1:0c:38:3a:1d:c2:e1:ff:70:96:fc:fd:e8:5f:0e:72:7d:25:2c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 34c91f30c445d465ae4ea9862cc82a6de453d526 b9dde86cf4fb693db8f47423415fd445002fe7a8 8bf81aba496cda6a511ea9f62162550c6789c9b9 87324d847169de4b75ab5afaa972914598154e9d 335d627b295c3d5546257161f61b636efd2a79b2 f5cefe5139797f47f393f6cfcea7818371ea9078 6afc2396c012983881259f624b3887f5720483ff d4895f3baa6f0d3caffbdc586c24ff90ddf3341c 6073fce3082995934566116334bf79c9eec9ee7f 6f092c309bd220e20811fdca313611cf809e1415 5d870bf66b93d86773c5b3eb52885bcc3e5a065c 4789d5af1d562f73798b27ee7b809ab5339257e7 50f048a5a7c1073d05be7e7b7efccd8c3101f749 c806156153afc4578d59f70a3e7977315e918beb 9f9fc5e6b92bfccc8ac76ac94f6ce4af8726f325 026438d3df250c823ea65257827829d1d0618a4c 2590ad6114720a95c9a034b70ce487222f542142 378aa8b87f350ba5b0d0d91ce652708f5ec4ffa2 ffbe8dc3bcfc4e4ce9f03061f8f320426a8b9093 9042c7d0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:a0:0c:1b:ba:e2:df:69:36:09:ef:cd:10:ca:a1:09:25:8b:a2:ed] modulus: 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 public exponent: 10001 ]