2021-11-16 09:10:50,803 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-16 09:10:51,562 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-16 09:10:52.354  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-16 09:10:55.408 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-16 09:10:55.651  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-16 09:10:55.833  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-16 09:10:57.928  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.69 seconds (JVM running for 9.473) 2021-11-16 09:12:04.702  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-16 09:12:04.719 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-16 09:12:04.762 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-16 09:12:04.767 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-16 09:12:04.787  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-16 09:12:04.790  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-16 09:12:04.792  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-16 09:12:04.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-16 09:12:04.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 09:12:04.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-16 09:12:04.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-16 09:12:04.812 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-16 09:12:04.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-16 09:12:04.875 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 09:12:04.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 09:12:04.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 09:12:05.525  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-16 09:12:05.529  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-16 09:12:05.529 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-16 09:12:05.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 09:12:05.544  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-16 09:12:05.545  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-16 09:12:05.546 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 09:12:05.547 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 09:12:05.547 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 09:12:05.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 09:12:05.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 09:12:05.563 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 09:12:05.570 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 09:12:05.570 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 09:12:05.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 09:12:05.573 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-16 09:12:05.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 653128296028583703031076935892997665664511891438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 16 09:08:30 UTC 2021 Final Date: Sun Nov 16 09:08:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:2a:59:03:86:2c:d8:96:fb:cf:48:75:32:da:3a:96:d6:d8:65:e7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8eaecfdb73608222896f97448b191ebe6c10f02e 8f1278a8570f2b1281060201763dbc51040f6cb0 c8873aa695ddc6ad2063ad7c4ee8ff922e82d78b 7f3363a42e2d71263d3046e4739a0a12e3a6f7d2 848060d791ad2436061e6014c00541ae649a1b06 62711eb6aba91b3eaf86dd53ddd7e6004e8f7639 70a1f8362996e03ce4ad53f9995ce3c504f01ee2 2d128e2a00056344697f050ca6dae16a55475b4d 33130c83d6f123928c220c006c24e36f208b9bf2 16196270793635a14ea6b8592c38559c0dfc2feb a343799954818026d33c67f5ebee05b7ef9a3021 20118bc444f6c0419c9c844b6dedde1fe3dbe8db 0bfeb33206a7783886db467e256a5321217dad2d 6efdbde68fccdbf3271eabb6dd7c580d00632c0b 969c767e44722c72e7e7c65fc67f7d308133e5c0 b55896ff7d45e20c019f044129e0135f2efcd8c5 2d84fe4266bc606b40e9345c650e75d072fb2b61 15681333b5050a712e0f42ca499ed57215be7f22 12c7e52e9d4aae8b70870fc89e449141d687531e bb9eb3a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:7b:32:56:38:55:35:c4:fb:1c:76:9e:9d:4a:77:ce:ec:57:94:6a] modulus: b3b2b723da049dea70dbd49f9b240b48536d8da03842d88e8a1e67aa1094073ba2e5cb501559f07bd1fcb6343b5dea582a6ef2d27f3e62d1d0e902d285206d4f1b3014ad60b71ee66cec2f76b2a75b58517231313669d10be2b23e0e0fb7c35b26f6370d66472c193a4faff314565fe5b16d202142032c09339f46c554409ae98657f8c3c659b0bf331ea7bdf1d35a938b9652d666b94f1826ea4f3c1822f1b8ba2b0623fab1300d84cf24896451bd0523e4b5015eb707d94d64f4210eb066a6603554ea22dbf454c02c4b99749f2013650df4c3fea75ca589a71d468d6f484cff3e06b105281af1edf5151f41f067a3de5dbdbb8e852f0b93ccb44174e1b7cd public exponent: 10001 ] 2021-11-16 11:02:09.784  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-16 11:02:09.788 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-16 11:02:09.791 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-16 11:02:09.793 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-16 11:02:09.793  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-16 11:02:09.795  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-16 11:02:09.795  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-16 11:02:09.796 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-16 11:02:09.796 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-16 11:02:09.797 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-16 11:02:09.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-16 11:02:09.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:02:09.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:02:09.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:02:09.985  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-16 11:02:09.986  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-16 11:02:09.987 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-16 11:02:09.988 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:02:09.991  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-16 11:02:09.992  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-16 11:02:09.993 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:02:09.993 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:02:09.994 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:02:09.997 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:02:09.998 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:02:09.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:02:10.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:02:10.001 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:02:10.002 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:02:10.003 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-16 11:02:10.010 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 653128296028583703031076935892997665664511891438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 16 09:08:30 UTC 2021 Final Date: Sun Nov 16 09:08:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:2a:59:03:86:2c:d8:96:fb:cf:48:75:32:da:3a:96:d6:d8:65:e7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8eaecfdb73608222896f97448b191ebe6c10f02e 8f1278a8570f2b1281060201763dbc51040f6cb0 c8873aa695ddc6ad2063ad7c4ee8ff922e82d78b 7f3363a42e2d71263d3046e4739a0a12e3a6f7d2 848060d791ad2436061e6014c00541ae649a1b06 62711eb6aba91b3eaf86dd53ddd7e6004e8f7639 70a1f8362996e03ce4ad53f9995ce3c504f01ee2 2d128e2a00056344697f050ca6dae16a55475b4d 33130c83d6f123928c220c006c24e36f208b9bf2 16196270793635a14ea6b8592c38559c0dfc2feb a343799954818026d33c67f5ebee05b7ef9a3021 20118bc444f6c0419c9c844b6dedde1fe3dbe8db 0bfeb33206a7783886db467e256a5321217dad2d 6efdbde68fccdbf3271eabb6dd7c580d00632c0b 969c767e44722c72e7e7c65fc67f7d308133e5c0 b55896ff7d45e20c019f044129e0135f2efcd8c5 2d84fe4266bc606b40e9345c650e75d072fb2b61 15681333b5050a712e0f42ca499ed57215be7f22 12c7e52e9d4aae8b70870fc89e449141d687531e bb9eb3a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:a3:57:6e:1e:c2:49:a6:6d:31:ea:37:90:4e:b8:e8:60:c9:37:40] modulus: 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 public exponent: 10001 ] 2021-11-16 11:06:44.008  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-16 11:06:44.013 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-16 11:06:44.015 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-16 11:06:44.017 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-16 11:06:44.018  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-16 11:06:44.019  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-16 11:06:44.019  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-16 11:06:44.020 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-16 11:06:44.020 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-16 11:06:44.022 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-16 11:06:44.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-16 11:06:44.031 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:06:44.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:06:44.033 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:06:44.211  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-16 11:06:44.212  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-16 11:06:44.213 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-16 11:06:44.214 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:06:44.217  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-16 11:06:44.218  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-16 11:06:44.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:06:44.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:06:44.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:06:44.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:06:44.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:06:44.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:06:44.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:06:44.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:06:44.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:06:44.228 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-16 11:06:44.243 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 653128296028583703031076935892997665664511891438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 16 09:08:30 UTC 2021 Final Date: Sun Nov 16 09:08:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:2a:59:03:86:2c:d8:96:fb:cf:48:75:32:da:3a:96:d6:d8:65:e7] modulus: eb3ae8cbfd1c4c45a37ac6572937ea58b701673404c0b94bb2abbebd6ce80481a057acb879521f63155e79539772eabd8a94fe14f8a418ceebdb2920571de73eb3cdccc390a2f266c036d8ebb090fdb308e825d692d29ec9f8f3751532653a557b2b091fffcbad853b5288b6936337511ed81e67f862a75e287e292967e367f7ff86e4093e61e057c3f6068748700c4985d10a7c96d458593169cc19ac22a7ce68fe750f34914bf26458b6c2ccaac4c9e55cb5718f61dd956056ed973caf3f769869c227b1da436d64571af4e5754a2404bfd1e0ded1c0e83b983cba371f7b4b8ef00a84f68b1b93bd149dd97b500698c8eedb29168bf560d03e00655ac19a77a9f099672e4e8c3fc8e2c9df4f161fdf1118b271ce7825628ccd1f90f8648e6f5c14aa8e054ba8b91a99f49cb679e6ef3b4a6e4c0253e8d3a63eba690021de43ae1ed93c133200dc531acf2d275ab67c360e24b0f7a4ac7738bd119c970e173fb1f327f75825ef38776e257f7ec44304a6d414b48e1e3166ce56f4504771c0dd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8eaecfdb73608222896f97448b191ebe6c10f02e 8f1278a8570f2b1281060201763dbc51040f6cb0 c8873aa695ddc6ad2063ad7c4ee8ff922e82d78b 7f3363a42e2d71263d3046e4739a0a12e3a6f7d2 848060d791ad2436061e6014c00541ae649a1b06 62711eb6aba91b3eaf86dd53ddd7e6004e8f7639 70a1f8362996e03ce4ad53f9995ce3c504f01ee2 2d128e2a00056344697f050ca6dae16a55475b4d 33130c83d6f123928c220c006c24e36f208b9bf2 16196270793635a14ea6b8592c38559c0dfc2feb a343799954818026d33c67f5ebee05b7ef9a3021 20118bc444f6c0419c9c844b6dedde1fe3dbe8db 0bfeb33206a7783886db467e256a5321217dad2d 6efdbde68fccdbf3271eabb6dd7c580d00632c0b 969c767e44722c72e7e7c65fc67f7d308133e5c0 b55896ff7d45e20c019f044129e0135f2efcd8c5 2d84fe4266bc606b40e9345c650e75d072fb2b61 15681333b5050a712e0f42ca499ed57215be7f22 12c7e52e9d4aae8b70870fc89e449141d687531e bb9eb3a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:80:24:3d:40:cd:e6:03:6d:c4:f2:c4:b4:75:50:f9:77:30:ff:45] modulus: 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 public exponent: 10001 ] 2021-11-16 11:07:13.115  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-16 11:07:13.117 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-16 11:07:13.118 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-16 11:07:13.120 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-16 11:07:13.121  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-16 11:07:13.122  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-16 11:07:13.123  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-16 11:07:13.123 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-16 11:07:13.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-16 11:07:13.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-16 11:07:13.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-16 11:07:13.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:07:13.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:07:13.133 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:07:13.256  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-16 11:07:13.257  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-16 11:07:13.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-16 11:07:13.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:07:13.260  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-16 11:07:13.261  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-16 11:07:13.261 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:07:13.262 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:07:13.262 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:07:13.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:07:13.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:07:13.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:07:13.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:07:13.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:07:13.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:07:13.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-16 11:07:13.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 653128296028583703031076935892997665664511891438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 16 09:08:30 UTC 2021 Final Date: Sun Nov 16 09:08:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:2a:59:03:86:2c:d8:96:fb:cf:48:75:32:da:3a:96:d6:d8:65:e7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8eaecfdb73608222896f97448b191ebe6c10f02e 8f1278a8570f2b1281060201763dbc51040f6cb0 c8873aa695ddc6ad2063ad7c4ee8ff922e82d78b 7f3363a42e2d71263d3046e4739a0a12e3a6f7d2 848060d791ad2436061e6014c00541ae649a1b06 62711eb6aba91b3eaf86dd53ddd7e6004e8f7639 70a1f8362996e03ce4ad53f9995ce3c504f01ee2 2d128e2a00056344697f050ca6dae16a55475b4d 33130c83d6f123928c220c006c24e36f208b9bf2 16196270793635a14ea6b8592c38559c0dfc2feb a343799954818026d33c67f5ebee05b7ef9a3021 20118bc444f6c0419c9c844b6dedde1fe3dbe8db 0bfeb33206a7783886db467e256a5321217dad2d 6efdbde68fccdbf3271eabb6dd7c580d00632c0b 969c767e44722c72e7e7c65fc67f7d308133e5c0 b55896ff7d45e20c019f044129e0135f2efcd8c5 2d84fe4266bc606b40e9345c650e75d072fb2b61 15681333b5050a712e0f42ca499ed57215be7f22 12c7e52e9d4aae8b70870fc89e449141d687531e bb9eb3a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:0f:6b:fa:24:96:b5:93:ae:f4:9d:71:6c:79:66:71:21:a2:7f:70] modulus: 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 public exponent: 10001 ] 2021-11-16 11:07:15.663  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-16 11:07:15.664 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-16 11:07:15.666 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-16 11:07:15.666 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-16 11:07:15.667  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-16 11:07:15.668  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-16 11:07:15.668  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-16 11:07:15.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-16 11:07:15.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-16 11:07:15.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-16 11:07:15.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-16 11:07:15.677 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:07:15.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:07:15.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:07:15.774  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-16 11:07:15.775  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-16 11:07:15.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-16 11:07:15.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:07:15.778  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-16 11:07:15.778  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-16 11:07:15.779 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:07:15.779 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:07:15.781 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:07:15.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:07:15.782 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:07:15.783 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:07:15.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:07:15.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:07:15.784 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:07:15.785 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-16 11:07:15.789 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 653128296028583703031076935892997665664511891438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 16 09:08:30 UTC 2021 Final Date: Sun Nov 16 09:08:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:2a:59:03:86:2c:d8:96:fb:cf:48:75:32:da:3a:96:d6:d8:65:e7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8eaecfdb73608222896f97448b191ebe6c10f02e 8f1278a8570f2b1281060201763dbc51040f6cb0 c8873aa695ddc6ad2063ad7c4ee8ff922e82d78b 7f3363a42e2d71263d3046e4739a0a12e3a6f7d2 848060d791ad2436061e6014c00541ae649a1b06 62711eb6aba91b3eaf86dd53ddd7e6004e8f7639 70a1f8362996e03ce4ad53f9995ce3c504f01ee2 2d128e2a00056344697f050ca6dae16a55475b4d 33130c83d6f123928c220c006c24e36f208b9bf2 16196270793635a14ea6b8592c38559c0dfc2feb a343799954818026d33c67f5ebee05b7ef9a3021 20118bc444f6c0419c9c844b6dedde1fe3dbe8db 0bfeb33206a7783886db467e256a5321217dad2d 6efdbde68fccdbf3271eabb6dd7c580d00632c0b 969c767e44722c72e7e7c65fc67f7d308133e5c0 b55896ff7d45e20c019f044129e0135f2efcd8c5 2d84fe4266bc606b40e9345c650e75d072fb2b61 15681333b5050a712e0f42ca499ed57215be7f22 12c7e52e9d4aae8b70870fc89e449141d687531e bb9eb3a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:eb:75:3c:7b:64:ee:e0:cb:db:ec:7c:25:70:5d:9b:e6:fd:b1:38] modulus: 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 public exponent: 10001 ] 2021-11-16 11:07:49.754  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-16 11:07:49.757 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-16 11:07:49.759 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-16 11:07:49.760 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-16 11:07:49.762  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-16 11:07:49.762  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-16 11:07:49.763  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-16 11:07:49.763 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-16 11:07:49.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-16 11:07:49.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-16 11:07:49.771 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-16 11:07:49.772 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:07:49.772 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:07:49.772 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:07:50.146  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-16 11:07:50.148  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-16 11:07:50.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-16 11:07:50.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:07:50.153  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-16 11:07:50.154  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-16 11:07:50.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:07:50.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:07:50.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:07:50.158 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:07:50.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:07:50.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:07:50.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:07:50.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:07:50.163 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:07:50.165 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-16 11:07:50.170 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 653128296028583703031076935892997665664511891438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 16 09:08:30 UTC 2021 Final Date: Sun Nov 16 09:08:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:2a:59:03:86:2c:d8:96:fb:cf:48:75:32:da:3a:96:d6:d8:65:e7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8eaecfdb73608222896f97448b191ebe6c10f02e 8f1278a8570f2b1281060201763dbc51040f6cb0 c8873aa695ddc6ad2063ad7c4ee8ff922e82d78b 7f3363a42e2d71263d3046e4739a0a12e3a6f7d2 848060d791ad2436061e6014c00541ae649a1b06 62711eb6aba91b3eaf86dd53ddd7e6004e8f7639 70a1f8362996e03ce4ad53f9995ce3c504f01ee2 2d128e2a00056344697f050ca6dae16a55475b4d 33130c83d6f123928c220c006c24e36f208b9bf2 16196270793635a14ea6b8592c38559c0dfc2feb a343799954818026d33c67f5ebee05b7ef9a3021 20118bc444f6c0419c9c844b6dedde1fe3dbe8db 0bfeb33206a7783886db467e256a5321217dad2d 6efdbde68fccdbf3271eabb6dd7c580d00632c0b 969c767e44722c72e7e7c65fc67f7d308133e5c0 b55896ff7d45e20c019f044129e0135f2efcd8c5 2d84fe4266bc606b40e9345c650e75d072fb2b61 15681333b5050a712e0f42ca499ed57215be7f22 12c7e52e9d4aae8b70870fc89e449141d687531e bb9eb3a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:3f:94:d3:ec:81:3f:1b:84:d5:18:30:50:43:0f:5d:e2:54:1b:90] modulus: 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 public exponent: 10001 ] 2021-11-16 11:09:05.805  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-16 11:09:05.809 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-16 11:09:05.812 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-16 11:09:05.815 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-16 11:09:05.816  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-16 11:09:05.817  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-16 11:09:05.818  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-16 11:09:05.826 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-16 11:09:05.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-16 11:09:05.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-16 11:09:05.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-16 11:09:05.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:09:05.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:09:05.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:09:05.992  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-16 11:09:05.993  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-16 11:09:05.993 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-16 11:09:05.993 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:09:05.995  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-16 11:09:05.995  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-16 11:09:05.995 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:09:05.997 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:09:05.997 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:09:05.998 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:09:05.999 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:09:06.000 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:09:06.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:09:06.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:09:06.004 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:09:06.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-16 11:09:06.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 653128296028583703031076935892997665664511891438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 16 09:08:30 UTC 2021 Final Date: Sun Nov 16 09:08:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:2a:59:03:86:2c:d8:96:fb:cf:48:75:32:da:3a:96:d6:d8:65:e7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8eaecfdb73608222896f97448b191ebe6c10f02e 8f1278a8570f2b1281060201763dbc51040f6cb0 c8873aa695ddc6ad2063ad7c4ee8ff922e82d78b 7f3363a42e2d71263d3046e4739a0a12e3a6f7d2 848060d791ad2436061e6014c00541ae649a1b06 62711eb6aba91b3eaf86dd53ddd7e6004e8f7639 70a1f8362996e03ce4ad53f9995ce3c504f01ee2 2d128e2a00056344697f050ca6dae16a55475b4d 33130c83d6f123928c220c006c24e36f208b9bf2 16196270793635a14ea6b8592c38559c0dfc2feb a343799954818026d33c67f5ebee05b7ef9a3021 20118bc444f6c0419c9c844b6dedde1fe3dbe8db 0bfeb33206a7783886db467e256a5321217dad2d 6efdbde68fccdbf3271eabb6dd7c580d00632c0b 969c767e44722c72e7e7c65fc67f7d308133e5c0 b55896ff7d45e20c019f044129e0135f2efcd8c5 2d84fe4266bc606b40e9345c650e75d072fb2b61 15681333b5050a712e0f42ca499ed57215be7f22 12c7e52e9d4aae8b70870fc89e449141d687531e bb9eb3a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:5a:24:96:cc:57:65:b9:95:0f:3d:9e:96:bb:1e:a8:bb:69:b9:9c] modulus: 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 public exponent: 10001 ] 2021-11-16 11:09:35.697  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-16 11:09:35.698 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-16 11:09:35.700 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-16 11:09:35.701 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-16 11:09:35.702  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-16 11:09:35.702  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-16 11:09:35.703  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-16 11:09:35.703 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-16 11:09:35.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-16 11:09:35.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-16 11:09:35.709 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-16 11:09:35.710 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:09:35.710 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:09:35.711 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:09:35.821  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-16 11:09:35.822  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-16 11:09:35.822 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-16 11:09:35.822 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:09:35.824  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-16 11:09:35.824  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-16 11:09:35.825 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:09:35.826 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:09:35.826 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:09:35.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:09:35.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:09:35.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:09:35.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:09:35.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:09:35.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:09:35.830 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-16 11:09:35.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 653128296028583703031076935892997665664511891438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 16 09:08:30 UTC 2021 Final Date: Sun Nov 16 09:08:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:2a:59:03:86:2c:d8:96:fb:cf:48:75:32:da:3a:96:d6:d8:65:e7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8eaecfdb73608222896f97448b191ebe6c10f02e 8f1278a8570f2b1281060201763dbc51040f6cb0 c8873aa695ddc6ad2063ad7c4ee8ff922e82d78b 7f3363a42e2d71263d3046e4739a0a12e3a6f7d2 848060d791ad2436061e6014c00541ae649a1b06 62711eb6aba91b3eaf86dd53ddd7e6004e8f7639 70a1f8362996e03ce4ad53f9995ce3c504f01ee2 2d128e2a00056344697f050ca6dae16a55475b4d 33130c83d6f123928c220c006c24e36f208b9bf2 16196270793635a14ea6b8592c38559c0dfc2feb a343799954818026d33c67f5ebee05b7ef9a3021 20118bc444f6c0419c9c844b6dedde1fe3dbe8db 0bfeb33206a7783886db467e256a5321217dad2d 6efdbde68fccdbf3271eabb6dd7c580d00632c0b 969c767e44722c72e7e7c65fc67f7d308133e5c0 b55896ff7d45e20c019f044129e0135f2efcd8c5 2d84fe4266bc606b40e9345c650e75d072fb2b61 15681333b5050a712e0f42ca499ed57215be7f22 12c7e52e9d4aae8b70870fc89e449141d687531e bb9eb3a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:b0:b6:37:05:46:3f:d7:26:ee:1f:fb:ab:99:91:9a:eb:48:b1:9f] modulus: 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 public exponent: 10001 ] 2021-11-16 11:11:19.356  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-16 11:11:19.359 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-16 11:11:19.363 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-16 11:11:19.364 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-16 11:11:19.365  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-16 11:11:19.366  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-16 11:11:19.366  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-16 11:11:19.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-16 11:11:19.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-16 11:11:19.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-16 11:11:19.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-16 11:11:19.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:11:19.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-16 11:11:19.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:11:19.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-16 11:11:19.492  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-16 11:11:19.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-16 11:11:19.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-16 11:11:19.495  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-16 11:11:19.495  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-16 11:11:19.496 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:11:19.496 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:11:19.500 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:11:19.506 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:11:19.506 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:11:19.507 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:11:19.507 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-16 11:11:19.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-16 11:11:19.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-16 11:11:19.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-16 11:11:19.522 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 653128296028583703031076935892997665664511891438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Nov 16 09:08:30 UTC 2021 Final Date: Sun Nov 16 09:08:29 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [54:2a:59:03:86:2c:d8:96:fb:cf:48:75:32:da:3a:96:d6:d8:65:e7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8eaecfdb73608222896f97448b191ebe6c10f02e 8f1278a8570f2b1281060201763dbc51040f6cb0 c8873aa695ddc6ad2063ad7c4ee8ff922e82d78b 7f3363a42e2d71263d3046e4739a0a12e3a6f7d2 848060d791ad2436061e6014c00541ae649a1b06 62711eb6aba91b3eaf86dd53ddd7e6004e8f7639 70a1f8362996e03ce4ad53f9995ce3c504f01ee2 2d128e2a00056344697f050ca6dae16a55475b4d 33130c83d6f123928c220c006c24e36f208b9bf2 16196270793635a14ea6b8592c38559c0dfc2feb a343799954818026d33c67f5ebee05b7ef9a3021 20118bc444f6c0419c9c844b6dedde1fe3dbe8db 0bfeb33206a7783886db467e256a5321217dad2d 6efdbde68fccdbf3271eabb6dd7c580d00632c0b 969c767e44722c72e7e7c65fc67f7d308133e5c0 b55896ff7d45e20c019f044129e0135f2efcd8c5 2d84fe4266bc606b40e9345c650e75d072fb2b61 15681333b5050a712e0f42ca499ed57215be7f22 12c7e52e9d4aae8b70870fc89e449141d687531e bb9eb3a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ef:a9:23:f7:4c:67:be:6a:a2:40:14:aa:7a:93:5d:49:75:89:a6:cd] modulus: b4afe18e9dc59ae5c60dcc5878404d12ec8cf74ffd1cf081194b319cb739d43c249e2cc421fffa47fd759b513edfc18f09f79d83b3c3d14805f9e8d96411ba6be33e5c9ffe94ada7436e34cba04a9cb381a67a627f5ab7bd3bf86f3d6e06063e02a1bf16607a2c1b0fd812685f909d5c1e6e5f40e4360881083b028ae887c7e739ca81c9083bd94c6b127b7601b223ddd4bf5639c319a672f2fef9b88e617385592e01c39e43fc55fd3dc20878691b57d7dd98164fc98e9afb88752e6b5dda83a53db1045d056fc7f902ba5bc6bd5039c2971414f81a3c8ebbd1b258b3ba4b33d8ad1b0943601c2b1a5ccf3e5139e866ada34352460596b4e5b4449c59547c37 public exponent: 10001 ]