2021-11-10 09:12:27,556 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-10 09:12:28,392 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-10 09:12:29.277  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-10 09:12:32.117 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-10 09:12:32.385  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-10 09:12:32.530  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-10 09:12:34.726  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.822 seconds (JVM running for 9.554) 2021-11-10 09:13:27.196  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-10 09:13:27.209 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-10 09:13:27.252 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-10 09:13:27.257 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 09:13:27.275  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-10 09:13:27.278  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-10 09:13:27.280  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-10 09:13:27.282 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-10 09:13:27.283 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 09:13:27.287 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-10 09:13:27.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-10 09:13:27.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-10 09:13:27.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-10 09:13:27.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 09:13:27.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 09:13:27.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 09:13:28.131  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-10 09:13:28.135  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-10 09:13:28.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-10 09:13:28.138 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 09:13:28.149  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-10 09:13:28.150  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-10 09:13:28.151 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 09:13:28.152 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 09:13:28.152 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 09:13:28.167 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 09:13:28.168 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 09:13:28.168 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 09:13:28.178 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 09:13:28.179 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 09:13:28.179 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 09:13:28.182 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 09:13:28.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 619508420098798493594831996026152635064206583569 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 09:09:53 UTC 2021 Final Date: Mon Nov 10 09:09:52 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:9d:f3:de:40:9d:05:4e:23:a5:7f:5f:75:29:37:46:d9:03:07:5a] modulus: 9a3083bb11cec4e5836bd97a36dfb4ab7a90b7e214a1a9c592c3850c57b96dfc9b42d1e2fb41ded760e33b4288c9c6161466501ee14d7a2321ec4f3068f265292edd05b470196378ef419799e92b38f85e74a4f59dcc86f589ef623d7b6f65a8932f871c61314b4684ac239e6d0d832836ae796e3478c883cd37fc8e36c8a7f6f55917adb4f1f58ecd84ebdb8ae2d50dfeeafa45c07d9888ec8312d4725db587a90263f2eb711234da7d0c91e85535dfa7e8b85a728b05208bfda70871238bf674b53fe6df36e34ee7910a5a49c9470f69b79f90e26706375b12fb430398c1364564f3ed863d1d0d35df9049b344d51e034b1ca67d4805cc4d3da4589acc70ce23188266b90429d91623bb3ae49d3431b0eb6153bf699575cc8737db02ecc0527684c15c227124f1297df04d01dd3260ac19fbd6f56edaa4035a0d22c16292cfa170b9a5e3e75291a8067796dc5a22cd3439e5908aa33e04edf039be5d0ead0a4b0fd509104c4721f09f7412be417abdbb5d3427e94e875fd27bb42126b04f01 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94add33b90558827909d017ca84368a2993cd0d7 7e5ca9ac81f9de0a06dc0d9cdd6faedfd4724400 98cdb4cedf041493cc88bbe6fadf1bb05069861a e2267e0ada82949877746bca5080103a60424834 b70174ddda0107b18be2b972c07811734d6aefd4 fd9b4581bd33d7612bc3bcde649cdff1353e9b0c b1f3d4ec4bfb09578aeb0ef2271dac2c928fb109 7b87efe9ea40444106d6a85684d41e2cf830b8d5 fdcd9901166e40ed292d6ea93768bea231254b4d 2b4504dc0da8a10a8f9687e31faf9283200a6430 eb72994bc7f33e22b880bcb8e4c2c670e32967a9 ab63b6c5718401d881ece7913d25efc659fd1a7e cd5f98da7ec47c53ffc28959b579995f60a57fdd ea98c93155fa127ea1c09b5d1337da9673ce882c 4eda0b89490d8063db59704195a537f39f18fce9 19eb707007409f2a6bb9724071c656a81809c64c 7949e39514e1ccb10e8cdc2a4ad807de49c4c1f6 f0eeb8c3f4cf951be75cb05a4f6cf50789f39345 fb35791dac24e2e24d2fedc2b7319c9186e2566c 6e8aa51a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:a3:dc:76:0a:2e:8f:ce:1c:a3:52:cc:30:1f:98:aa:33:d9:d1:8f] modulus: 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 public exponent: 10001 ] 2021-11-10 10:55:48.970  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-10 10:55:48.976 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-10 10:55:48.980 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-10 10:55:48.982 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 10:55:48.983  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-10 10:55:48.984  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-10 10:55:48.984  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-10 10:55:48.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-10 10:55:48.990 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-10 10:55:48.992 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-10 10:55:49.005 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-10 10:55:49.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 10:55:49.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 10:55:49.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 10:55:49.213  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-10 10:55:49.215  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-10 10:55:49.220 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-10 10:55:49.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 10:55:49.227  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-10 10:55:49.229  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-10 10:55:49.229 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 10:55:49.230 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 10:55:49.230 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 10:55:49.232 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 10:55:49.232 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 10:55:49.233 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 10:55:49.235 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 10:55:49.235 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 10:55:49.236 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 10:55:49.238 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 10:55:49.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 619508420098798493594831996026152635064206583569 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 09:09:53 UTC 2021 Final Date: Mon Nov 10 09:09:52 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:9d:f3:de:40:9d:05:4e:23:a5:7f:5f:75:29:37:46:d9:03:07:5a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94add33b90558827909d017ca84368a2993cd0d7 7e5ca9ac81f9de0a06dc0d9cdd6faedfd4724400 98cdb4cedf041493cc88bbe6fadf1bb05069861a e2267e0ada82949877746bca5080103a60424834 b70174ddda0107b18be2b972c07811734d6aefd4 fd9b4581bd33d7612bc3bcde649cdff1353e9b0c b1f3d4ec4bfb09578aeb0ef2271dac2c928fb109 7b87efe9ea40444106d6a85684d41e2cf830b8d5 fdcd9901166e40ed292d6ea93768bea231254b4d 2b4504dc0da8a10a8f9687e31faf9283200a6430 eb72994bc7f33e22b880bcb8e4c2c670e32967a9 ab63b6c5718401d881ece7913d25efc659fd1a7e cd5f98da7ec47c53ffc28959b579995f60a57fdd ea98c93155fa127ea1c09b5d1337da9673ce882c 4eda0b89490d8063db59704195a537f39f18fce9 19eb707007409f2a6bb9724071c656a81809c64c 7949e39514e1ccb10e8cdc2a4ad807de49c4c1f6 f0eeb8c3f4cf951be75cb05a4f6cf50789f39345 fb35791dac24e2e24d2fedc2b7319c9186e2566c 6e8aa51a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4c:37:9c:a0:10:45:1f:00:b2:f6:1a:5b:1f:29:96:9c:53:a8:99:a0] modulus: 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 public exponent: 10001 ] 2021-11-10 10:57:55.316  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-10 10:57:55.321 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-10 10:57:55.324 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-10 10:57:55.326 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 10:57:55.327  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-10 10:57:55.328  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-10 10:57:55.329  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-10 10:57:55.330 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-10 10:57:55.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-10 10:57:55.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-10 10:57:55.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-10 10:57:55.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 10:57:55.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 10:57:55.354 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 10:57:55.527  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-10 10:57:55.528  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-10 10:57:55.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-10 10:57:55.529 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 10:57:55.532  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-10 10:57:55.532  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-10 10:57:55.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 10:57:55.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 10:57:55.534 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 10:57:55.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 10:57:55.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 10:57:55.536 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 10:57:55.537 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 10:57:55.538 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 10:57:55.538 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 10:57:55.540 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 10:57:55.545 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 619508420098798493594831996026152635064206583569 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 09:09:53 UTC 2021 Final Date: Mon Nov 10 09:09:52 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:9d:f3:de:40:9d:05:4e:23:a5:7f:5f:75:29:37:46:d9:03:07:5a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94add33b90558827909d017ca84368a2993cd0d7 7e5ca9ac81f9de0a06dc0d9cdd6faedfd4724400 98cdb4cedf041493cc88bbe6fadf1bb05069861a e2267e0ada82949877746bca5080103a60424834 b70174ddda0107b18be2b972c07811734d6aefd4 fd9b4581bd33d7612bc3bcde649cdff1353e9b0c b1f3d4ec4bfb09578aeb0ef2271dac2c928fb109 7b87efe9ea40444106d6a85684d41e2cf830b8d5 fdcd9901166e40ed292d6ea93768bea231254b4d 2b4504dc0da8a10a8f9687e31faf9283200a6430 eb72994bc7f33e22b880bcb8e4c2c670e32967a9 ab63b6c5718401d881ece7913d25efc659fd1a7e cd5f98da7ec47c53ffc28959b579995f60a57fdd ea98c93155fa127ea1c09b5d1337da9673ce882c 4eda0b89490d8063db59704195a537f39f18fce9 19eb707007409f2a6bb9724071c656a81809c64c 7949e39514e1ccb10e8cdc2a4ad807de49c4c1f6 f0eeb8c3f4cf951be75cb05a4f6cf50789f39345 fb35791dac24e2e24d2fedc2b7319c9186e2566c 6e8aa51a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:89:4f:8d:f0:bb:28:b4:c4:8d:3d:f4:38:e0:61:d4:0b:a3:90:27] modulus: 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 public exponent: 10001 ] 2021-11-10 11:00:27.262  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-10 11:00:27.265 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-10 11:00:27.267 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-10 11:00:27.268 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 11:00:27.269  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-10 11:00:27.269  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-10 11:00:27.270  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-10 11:00:27.270 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-10 11:00:27.271 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-10 11:00:27.272 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-10 11:00:27.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-10 11:00:27.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:00:27.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:00:27.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:00:27.463  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-10 11:00:27.464  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-10 11:00:27.464 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-10 11:00:27.465 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:00:27.468  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-10 11:00:27.469  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-10 11:00:27.470 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:00:27.470 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:00:27.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:00:27.473 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:00:27.473 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:00:27.473 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:00:27.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:00:27.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:00:27.482 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:00:27.486 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 11:00:27.512 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 619508420098798493594831996026152635064206583569 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 09:09:53 UTC 2021 Final Date: Mon Nov 10 09:09:52 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:9d:f3:de:40:9d:05:4e:23:a5:7f:5f:75:29:37:46:d9:03:07:5a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94add33b90558827909d017ca84368a2993cd0d7 7e5ca9ac81f9de0a06dc0d9cdd6faedfd4724400 98cdb4cedf041493cc88bbe6fadf1bb05069861a e2267e0ada82949877746bca5080103a60424834 b70174ddda0107b18be2b972c07811734d6aefd4 fd9b4581bd33d7612bc3bcde649cdff1353e9b0c b1f3d4ec4bfb09578aeb0ef2271dac2c928fb109 7b87efe9ea40444106d6a85684d41e2cf830b8d5 fdcd9901166e40ed292d6ea93768bea231254b4d 2b4504dc0da8a10a8f9687e31faf9283200a6430 eb72994bc7f33e22b880bcb8e4c2c670e32967a9 ab63b6c5718401d881ece7913d25efc659fd1a7e cd5f98da7ec47c53ffc28959b579995f60a57fdd ea98c93155fa127ea1c09b5d1337da9673ce882c 4eda0b89490d8063db59704195a537f39f18fce9 19eb707007409f2a6bb9724071c656a81809c64c 7949e39514e1ccb10e8cdc2a4ad807de49c4c1f6 f0eeb8c3f4cf951be75cb05a4f6cf50789f39345 fb35791dac24e2e24d2fedc2b7319c9186e2566c 6e8aa51a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:d6:3d:70:02:c1:8a:60:2f:df:b9:8b:0f:d9:cd:3b:12:c9:de:cf] modulus: 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 public exponent: 10001 ] 2021-11-10 11:00:42.092  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-10 11:00:42.094 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-10 11:00:42.095 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-10 11:00:42.096 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 11:00:42.096  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-10 11:00:42.097  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-10 11:00:42.098  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-10 11:00:42.098 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-10 11:00:42.099 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-10 11:00:42.099 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-10 11:00:42.104 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-10 11:00:42.104 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:00:42.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:00:42.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:00:42.223  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-10 11:00:42.223  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-10 11:00:42.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-10 11:00:42.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:00:42.227  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-10 11:00:42.228  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-10 11:00:42.229 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:00:42.229 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:00:42.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:00:42.231 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:00:42.231 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:00:42.232 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:00:42.233 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:00:42.234 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:00:42.234 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:00:42.236 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 11:00:42.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 619508420098798493594831996026152635064206583569 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 09:09:53 UTC 2021 Final Date: Mon Nov 10 09:09:52 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:9d:f3:de:40:9d:05:4e:23:a5:7f:5f:75:29:37:46:d9:03:07:5a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94add33b90558827909d017ca84368a2993cd0d7 7e5ca9ac81f9de0a06dc0d9cdd6faedfd4724400 98cdb4cedf041493cc88bbe6fadf1bb05069861a e2267e0ada82949877746bca5080103a60424834 b70174ddda0107b18be2b972c07811734d6aefd4 fd9b4581bd33d7612bc3bcde649cdff1353e9b0c b1f3d4ec4bfb09578aeb0ef2271dac2c928fb109 7b87efe9ea40444106d6a85684d41e2cf830b8d5 fdcd9901166e40ed292d6ea93768bea231254b4d 2b4504dc0da8a10a8f9687e31faf9283200a6430 eb72994bc7f33e22b880bcb8e4c2c670e32967a9 ab63b6c5718401d881ece7913d25efc659fd1a7e cd5f98da7ec47c53ffc28959b579995f60a57fdd ea98c93155fa127ea1c09b5d1337da9673ce882c 4eda0b89490d8063db59704195a537f39f18fce9 19eb707007409f2a6bb9724071c656a81809c64c 7949e39514e1ccb10e8cdc2a4ad807de49c4c1f6 f0eeb8c3f4cf951be75cb05a4f6cf50789f39345 fb35791dac24e2e24d2fedc2b7319c9186e2566c 6e8aa51a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [52:72:5c:93:e4:67:17:1b:74:ed:07:79:42:b9:d7:97:7c:39:c8:b7] modulus: b12551fee5dfd498c45a34a293c159ba75cb06199dc0b3604cf2d6d524c0075d7321ebd6b2a89c1e5abd4c08bc8c40afe5c26d7e5661e1e0706b7de9877692306b32cb17a1598db75eb34892526d158790fbef7ae370cdf97e24bea2b427e9ff944c92ec62a796c158dee17b1ea1c58d8ce57a56fd36710ca1d125aa64b3dc577bb8bebc7d0498f55e46b8e05c1a79f014bff74463f38173eefc0a7c260d963323a263e9dca3163020fefa16df96ab2ca26e9bc41633c50d9932fc10ecb86da3c1b9dd884a2c4af6e43e6603f1fbcf70a998c7d3e3b352e5b583f23bd55e7742940327cb7082f62068f780ec421028a143203c17f39767eda3aced36e6cbcb33 public exponent: 10001 ] 2021-11-10 11:01:14.666  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-10 11:01:14.669 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-10 11:01:14.672 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-10 11:01:14.673 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 11:01:14.673  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-10 11:01:14.674  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-10 11:01:14.675  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-10 11:01:14.675 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-10 11:01:14.676 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-10 11:01:14.676 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-10 11:01:14.685 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-10 11:01:14.686 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:01:14.686 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:01:14.686 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:01:14.937  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-10 11:01:14.938  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-10 11:01:14.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-10 11:01:14.939 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:01:14.941  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-10 11:01:14.942  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-10 11:01:14.942 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:01:14.943 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:01:14.943 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:01:14.944 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:01:14.944 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:01:14.945 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:01:14.946 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:01:14.946 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:01:14.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:01:14.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 11:01:14.951 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 619508420098798493594831996026152635064206583569 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 09:09:53 UTC 2021 Final Date: Mon Nov 10 09:09:52 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:9d:f3:de:40:9d:05:4e:23:a5:7f:5f:75:29:37:46:d9:03:07:5a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94add33b90558827909d017ca84368a2993cd0d7 7e5ca9ac81f9de0a06dc0d9cdd6faedfd4724400 98cdb4cedf041493cc88bbe6fadf1bb05069861a e2267e0ada82949877746bca5080103a60424834 b70174ddda0107b18be2b972c07811734d6aefd4 fd9b4581bd33d7612bc3bcde649cdff1353e9b0c b1f3d4ec4bfb09578aeb0ef2271dac2c928fb109 7b87efe9ea40444106d6a85684d41e2cf830b8d5 fdcd9901166e40ed292d6ea93768bea231254b4d 2b4504dc0da8a10a8f9687e31faf9283200a6430 eb72994bc7f33e22b880bcb8e4c2c670e32967a9 ab63b6c5718401d881ece7913d25efc659fd1a7e cd5f98da7ec47c53ffc28959b579995f60a57fdd ea98c93155fa127ea1c09b5d1337da9673ce882c 4eda0b89490d8063db59704195a537f39f18fce9 19eb707007409f2a6bb9724071c656a81809c64c 7949e39514e1ccb10e8cdc2a4ad807de49c4c1f6 f0eeb8c3f4cf951be75cb05a4f6cf50789f39345 fb35791dac24e2e24d2fedc2b7319c9186e2566c 6e8aa51a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:fb:e6:5f:fb:ba:ab:5f:2a:83:eb:60:cb:47:b8:bf:45:58:6e:1c] modulus: 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 public exponent: 10001 ] 2021-11-10 11:01:49.029  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-10 11:01:49.031 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-10 11:01:49.033 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-10 11:01:49.033 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 11:01:49.034  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-10 11:01:49.034  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-10 11:01:49.035  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-10 11:01:49.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-10 11:01:49.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-10 11:01:49.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-10 11:01:49.042 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-10 11:01:49.042 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:01:49.043 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:01:49.043 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:01:49.236  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-10 11:01:49.237  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-10 11:01:49.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-10 11:01:49.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:01:49.240  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-10 11:01:49.240  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-10 11:01:49.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:01:49.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:01:49.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:01:49.242 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:01:49.242 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:01:49.242 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:01:49.243 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:01:49.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:01:49.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:01:49.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 11:01:49.249 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 619508420098798493594831996026152635064206583569 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 09:09:53 UTC 2021 Final Date: Mon Nov 10 09:09:52 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:9d:f3:de:40:9d:05:4e:23:a5:7f:5f:75:29:37:46:d9:03:07:5a] modulus: 9a3083bb11cec4e5836bd97a36dfb4ab7a90b7e214a1a9c592c3850c57b96dfc9b42d1e2fb41ded760e33b4288c9c6161466501ee14d7a2321ec4f3068f265292edd05b470196378ef419799e92b38f85e74a4f59dcc86f589ef623d7b6f65a8932f871c61314b4684ac239e6d0d832836ae796e3478c883cd37fc8e36c8a7f6f55917adb4f1f58ecd84ebdb8ae2d50dfeeafa45c07d9888ec8312d4725db587a90263f2eb711234da7d0c91e85535dfa7e8b85a728b05208bfda70871238bf674b53fe6df36e34ee7910a5a49c9470f69b79f90e26706375b12fb430398c1364564f3ed863d1d0d35df9049b344d51e034b1ca67d4805cc4d3da4589acc70ce23188266b90429d91623bb3ae49d3431b0eb6153bf699575cc8737db02ecc0527684c15c227124f1297df04d01dd3260ac19fbd6f56edaa4035a0d22c16292cfa170b9a5e3e75291a8067796dc5a22cd3439e5908aa33e04edf039be5d0ead0a4b0fd509104c4721f09f7412be417abdbb5d3427e94e875fd27bb42126b04f01 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94add33b90558827909d017ca84368a2993cd0d7 7e5ca9ac81f9de0a06dc0d9cdd6faedfd4724400 98cdb4cedf041493cc88bbe6fadf1bb05069861a e2267e0ada82949877746bca5080103a60424834 b70174ddda0107b18be2b972c07811734d6aefd4 fd9b4581bd33d7612bc3bcde649cdff1353e9b0c b1f3d4ec4bfb09578aeb0ef2271dac2c928fb109 7b87efe9ea40444106d6a85684d41e2cf830b8d5 fdcd9901166e40ed292d6ea93768bea231254b4d 2b4504dc0da8a10a8f9687e31faf9283200a6430 eb72994bc7f33e22b880bcb8e4c2c670e32967a9 ab63b6c5718401d881ece7913d25efc659fd1a7e cd5f98da7ec47c53ffc28959b579995f60a57fdd ea98c93155fa127ea1c09b5d1337da9673ce882c 4eda0b89490d8063db59704195a537f39f18fce9 19eb707007409f2a6bb9724071c656a81809c64c 7949e39514e1ccb10e8cdc2a4ad807de49c4c1f6 f0eeb8c3f4cf951be75cb05a4f6cf50789f39345 fb35791dac24e2e24d2fedc2b7319c9186e2566c 6e8aa51a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:84:ae:87:47:15:24:29:c1:d0:f4:d6:ab:63:cf:20:98:7d:93:72] modulus: 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 public exponent: 10001 ] 2021-11-10 11:02:40.326  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-10 11:02:40.335 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-10 11:02:40.339 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-10 11:02:40.341 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 11:02:40.342  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-10 11:02:40.342  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-10 11:02:40.343  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-10 11:02:40.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-10 11:02:40.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-10 11:02:40.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-10 11:02:40.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-10 11:02:40.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:02:40.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:02:40.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:02:40.478  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-10 11:02:40.478  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-10 11:02:40.479 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-10 11:02:40.479 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:02:40.481  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-10 11:02:40.481  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-10 11:02:40.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:02:40.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:02:40.483 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:02:40.483 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:02:40.484 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:02:40.484 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:02:40.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:02:40.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:02:40.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:02:40.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 11:02:40.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 619508420098798493594831996026152635064206583569 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 09:09:53 UTC 2021 Final Date: Mon Nov 10 09:09:52 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:9d:f3:de:40:9d:05:4e:23:a5:7f:5f:75:29:37:46:d9:03:07:5a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94add33b90558827909d017ca84368a2993cd0d7 7e5ca9ac81f9de0a06dc0d9cdd6faedfd4724400 98cdb4cedf041493cc88bbe6fadf1bb05069861a e2267e0ada82949877746bca5080103a60424834 b70174ddda0107b18be2b972c07811734d6aefd4 fd9b4581bd33d7612bc3bcde649cdff1353e9b0c b1f3d4ec4bfb09578aeb0ef2271dac2c928fb109 7b87efe9ea40444106d6a85684d41e2cf830b8d5 fdcd9901166e40ed292d6ea93768bea231254b4d 2b4504dc0da8a10a8f9687e31faf9283200a6430 eb72994bc7f33e22b880bcb8e4c2c670e32967a9 ab63b6c5718401d881ece7913d25efc659fd1a7e cd5f98da7ec47c53ffc28959b579995f60a57fdd ea98c93155fa127ea1c09b5d1337da9673ce882c 4eda0b89490d8063db59704195a537f39f18fce9 19eb707007409f2a6bb9724071c656a81809c64c 7949e39514e1ccb10e8cdc2a4ad807de49c4c1f6 f0eeb8c3f4cf951be75cb05a4f6cf50789f39345 fb35791dac24e2e24d2fedc2b7319c9186e2566c 6e8aa51a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:ac:b6:ad:ed:6a:7a:98:4e:01:64:de:1a:99:af:47:51:b3:4e:ea] modulus: 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 public exponent: 10001 ] 2021-11-10 11:03:36.443  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-10 11:03:36.446 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-10 11:03:36.448 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-10 11:03:36.449 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-10 11:03:36.450  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-10 11:03:36.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-10 11:03:36.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-10 11:03:36.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-10 11:03:36.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-10 11:03:36.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-10 11:03:36.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-10 11:03:36.460 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:03:36.461 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-10 11:03:36.461 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:03:36.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-10 11:03:36.672  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-10 11:03:36.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-10 11:03:36.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-10 11:03:36.675  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-10 11:03:36.676  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-10 11:03:36.677 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:03:36.677 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:03:36.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:03:36.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:03:36.680 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:03:36.680 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:03:36.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-10 11:03:36.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-10 11:03:36.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-10 11:03:36.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-10 11:03:36.690 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 619508420098798493594831996026152635064206583569 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 10 09:09:53 UTC 2021 Final Date: Mon Nov 10 09:09:52 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ce:9d:f3:de:40:9d:05:4e:23:a5:7f:5f:75:29:37:46:d9:03:07:5a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94add33b90558827909d017ca84368a2993cd0d7 7e5ca9ac81f9de0a06dc0d9cdd6faedfd4724400 98cdb4cedf041493cc88bbe6fadf1bb05069861a e2267e0ada82949877746bca5080103a60424834 b70174ddda0107b18be2b972c07811734d6aefd4 fd9b4581bd33d7612bc3bcde649cdff1353e9b0c b1f3d4ec4bfb09578aeb0ef2271dac2c928fb109 7b87efe9ea40444106d6a85684d41e2cf830b8d5 fdcd9901166e40ed292d6ea93768bea231254b4d 2b4504dc0da8a10a8f9687e31faf9283200a6430 eb72994bc7f33e22b880bcb8e4c2c670e32967a9 ab63b6c5718401d881ece7913d25efc659fd1a7e cd5f98da7ec47c53ffc28959b579995f60a57fdd ea98c93155fa127ea1c09b5d1337da9673ce882c 4eda0b89490d8063db59704195a537f39f18fce9 19eb707007409f2a6bb9724071c656a81809c64c 7949e39514e1ccb10e8cdc2a4ad807de49c4c1f6 f0eeb8c3f4cf951be75cb05a4f6cf50789f39345 fb35791dac24e2e24d2fedc2b7319c9186e2566c 6e8aa51a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:d4:ee:d4:bb:54:57:6b:0c:26:e7:57:68:61:74:67:8c:6e:ad:02] modulus: c42fe12b49f86be3a01c0c56da42007f18b5ebb606dadce64dff0ee270962f3b30df1ef1d822035177cfc335ff2e71a988a7beba050dd39807b029f602a0604ed51b54b7524b8ba214f2f1c45628484f6b4a6aa23d007ab929453230c6806146891dd23ce16b98b1205f70fac7ec610851e8a965f0dfea6b267acc9e4ed61402359e16318c20ca8ee4fd39c121f71cda264b6bef795a46411b4cf5a63c4ddb00ae45955e36e1bfa848e798aeb2e9edc552d45b2f9d214b2c0e652b57808081cfa9a429103ef37ea4bce91a0603287f02a8db83a168fc143f21f5e7ce50a4d9c0e768a6a45a9d52e31787188adf1ec5a91fbf2b4489b2301dcfc97cb2248b6bfb public exponent: 10001 ]