2021-11-21 09:25:39,879 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-21 09:25:40,698 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-21 09:25:41.472  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-21 09:25:44.362 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-21 09:25:44.602  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-21 09:25:44.747  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-21 09:25:46.618  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.335 seconds (JVM running for 9.1) 2021-11-21 09:28:01.401  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 09:28:01.415 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 09:28:01.468 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-21 09:28:01.478 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 09:28:01.499  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-21 09:28:01.502  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 09:28:01.503  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 09:28:01.506 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 09:28:01.506 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 09:28:01.511 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 09:28:01.519 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 09:28:01.523 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 09:28:01.567 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 09:28:01.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 09:28:01.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 09:28:01.580 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 09:28:02.336  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 09:28:02.340  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 09:28:02.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 09:28:02.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 09:28:02.353  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 09:28:02.354  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 09:28:02.356 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 09:28:02.356 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 09:28:02.357 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 09:28:02.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 09:28:02.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 09:28:02.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 09:28:02.378 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 09:28:02.379 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 09:28:02.379 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 09:28:02.381 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 09:28:02.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:dd:46:ea:c5:3a:1c:4f:7c:e3:83:06:ca:14:8e:8e:e8:8f:f6:f2] modulus: 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 public exponent: 10001 ] 2021-11-21 11:28:23.441  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:28:23.444 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:28:23.447 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-21 11:28:23.448 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:28:23.449  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-21 11:28:23.451  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:28:23.451  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:28:23.452 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:28:23.453 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:28:23.454 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:28:23.465 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:28:23.466 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:28:23.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:28:23.468 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:28:23.697  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:28:23.698  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:28:23.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:28:23.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:28:23.703  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:28:23.704  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:28:23.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:28:23.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:28:23.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:28:23.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:28:23.708 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:28:23.708 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:28:23.709 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:28:23.710 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:28:23.710 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:28:23.712 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:28:23.718 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:32:8a:33:72:56:08:0c:ff:39:f5:07:f3:a7:a0:bc:01:56:90:7b] modulus: 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 public exponent: 10001 ] 2021-11-21 11:31:32.231  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:31:32.233 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:31:32.236 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-21 11:31:32.239 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:31:32.239  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-21 11:31:32.240  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:31:32.241  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:31:32.241 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:31:32.242 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:31:32.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:31:32.262 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:31:32.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:31:32.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:31:32.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:31:32.426  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:31:32.427  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:31:32.428 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:31:32.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:31:32.432  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:31:32.432  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:31:32.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:31:32.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:31:32.434 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:31:32.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:31:32.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:31:32.436 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:31:32.437 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:31:32.437 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:31:32.437 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:31:32.438 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:31:32.443 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fb:9c:b8:7e:2b:0f:4c:40:d5:fd:51:7d:39:80:c9:9d:7f:c5:d5:fb] modulus: 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 public exponent: 10001 ] 2021-11-21 11:33:05.421  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:33:05.424 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:33:05.427 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-21 11:33:05.428 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:33:05.429  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-21 11:33:05.430  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:33:05.431  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:33:05.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:33:05.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:33:05.433 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:33:05.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:33:05.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:33:05.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:33:05.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:33:05.643  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:33:05.645  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:33:05.645 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:33:05.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:33:05.648  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:33:05.649  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:33:05.649 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:33:05.650 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:33:05.650 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:33:05.651 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:33:05.651 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:33:05.651 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:33:05.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:33:05.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:33:05.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:33:05.654 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:33:05.659 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 93afb532e1ac0e71f37f97cac7d654af86ea185e63247c522be4ef2f73c2fcb6f577ba1290412c2cc44777f2f4e68fe7d657bafc9189eac46af10a33290402e212f9802ae28f60698a0b304c81c1f8fd067780fa0aef54a90bb7ef6a9cefb72809bf932bd1179233c54a34da649b4c2115eb5d85c862bbc31f5343cc4e6aa53bebb065b2bfb2811d817749d206df7d0fdac9a6e0c72007c9c403d4f660ae600e856ca3861ce15ce23f6b41a6557c8b9651d35360c0d3b99ac6b170f933188fbaf234e65d7f7ef52155d163518ceac0e385d68ae2f17e4f1967bcb9294f9b533d6072d6d8802cc7528dd482257c7e1cb6d5b62b0f78de891135441db08163f963e5c672f208d6ccc2ab7592b301989d3cfda130cb0dae9fba06f108b0eee25f34d6c2a2fc04a1db99eed2925b849055849c4dabb25000191131832c2e6f38663594a8b3788e18a867c409907dd96c15cd8be37d38a06a78d39a3410bd3b81081ac93e07d22f63aa116724098456711bce8eccef10bafdc08325bb31f14f2bff0d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:78:57:e5:ad:85:ae:9d:88:3b:24:ea:02:29:85:70:b1:06:15:0c] modulus: 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 public exponent: 10001 ] 2021-11-21 11:35:20.535  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:35:20.538 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:35:20.540 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-21 11:35:20.542 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:35:20.542  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-21 11:35:20.543  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:35:20.544  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:35:20.544 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:35:20.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:35:20.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:35:20.550 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:35:20.551 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:35:20.551 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:35:20.552 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:35:20.728  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:35:20.729  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:35:20.730 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:35:20.731 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:35:20.734  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:35:20.735  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:35:20.735 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:35:20.736 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:35:20.736 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:35:20.738 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:35:20.738 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:35:20.739 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:35:20.741 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:35:20.741 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:35:20.741 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:35:20.742 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:35:20.748 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 93afb532e1ac0e71f37f97cac7d654af86ea185e63247c522be4ef2f73c2fcb6f577ba1290412c2cc44777f2f4e68fe7d657bafc9189eac46af10a33290402e212f9802ae28f60698a0b304c81c1f8fd067780fa0aef54a90bb7ef6a9cefb72809bf932bd1179233c54a34da649b4c2115eb5d85c862bbc31f5343cc4e6aa53bebb065b2bfb2811d817749d206df7d0fdac9a6e0c72007c9c403d4f660ae600e856ca3861ce15ce23f6b41a6557c8b9651d35360c0d3b99ac6b170f933188fbaf234e65d7f7ef52155d163518ceac0e385d68ae2f17e4f1967bcb9294f9b533d6072d6d8802cc7528dd482257c7e1cb6d5b62b0f78de891135441db08163f963e5c672f208d6ccc2ab7592b301989d3cfda130cb0dae9fba06f108b0eee25f34d6c2a2fc04a1db99eed2925b849055849c4dabb25000191131832c2e6f38663594a8b3788e18a867c409907dd96c15cd8be37d38a06a78d39a3410bd3b81081ac93e07d22f63aa116724098456711bce8eccef10bafdc08325bb31f14f2bff0d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:34:12:dd:5e:10:fa:5a:f3:17:44:e5:66:9c:b0:21:86:fd:8c:19] modulus: c5faa0e2f38c9304a18622b06b4aa7015a4d49d8b23fe379e06394433fa86006c8ccb7c98b2ffc5a8d52a2de22e60b7378c6d388c6e746907fa8f78b2050517d83fc52ccbfb4eb87bedf7ab2b67422b95d76f25c08e0f4937059ebd562321c332b926b3c8e02e5ba7abf7e2a05e926474d62db73b6a28f7c97045f3862f34bfc70f5635438fb1f02b7a18931de20a0bbc7acfbf3dd6d1a8ac2afed799b0dc7b2898347540adee31031f6b0f338a86d5112effd8971f047aaf589d539506cc30c728e3e911410632ad533910990fa3ba4324b22894a091d31774dba314bd378304042f4f698a4319ae48ea875eb97e74c550fef9c04d7e27555ff33566ecac765 public exponent: 10001 ] 2021-11-21 11:37:59.325  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:37:59.328 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:37:59.331 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-21 11:37:59.332 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:37:59.333  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-21 11:37:59.333  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:37:59.334  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:37:59.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:37:59.335 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:37:59.335 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:37:59.342 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:37:59.343 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:37:59.343 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:37:59.344 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:37:59.496  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:37:59.497  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:37:59.498 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:37:59.498 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:37:59.500  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:37:59.500  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:37:59.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:37:59.502 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:37:59.503 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:37:59.504 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:37:59.504 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:37:59.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:37:59.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:37:59.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:37:59.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:37:59.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:37:59.512 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:3c:7e:83:83:51:7e:d7:66:85:0e:58:f0:3d:14:f8:be:6c:cf:5b] modulus: e3359daa82790c7ae842a8aa18e916385f3bfa50e41081e3d420ed9eef4ad4c93010b8d5c2ba44f9c4d50094bb200d13e620107497f1f581550573efa27f198863bc3127d2a03cf36ac722341a6fd7001b18143c533f46fc69047ccd58d286a826f1d014ec80f2ad323a98eb4129694f9d57af56b47364d7d1c3732fdc0ce4c39efc1f451981e0f2585a709d12a352b10e01378619a216e789163d314bd0542c4b6c7b6d1c625402d70f994ef255d09a5a850b04af2e471096d2c91745136d8e3ac8345cbdedd1a86d40cb7d6e42f53f68d646006af92be6f57eaa77be98b3f84c27ea90be0589385633194fb11ac4c9718ad253b342e091650ce2e4748b1f0f public exponent: 10001 ] 2021-11-21 11:42:43.857  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:42:43.860 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:42:43.863 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-21 11:42:43.864 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:42:43.865  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-21 11:42:43.865  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:42:43.866  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:42:43.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:42:43.867 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:42:43.867 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:42:43.873 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:42:43.873 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:42:43.874 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:42:43.874 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:42:43.998  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:42:43.999  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:42:44.000 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:42:44.000 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:42:44.002  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:42:44.002  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:42:44.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:42:44.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:42:44.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:42:44.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:42:44.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:42:44.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:42:44.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:42:44.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:42:44.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:42:44.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:42:44.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [33:30:c9:bb:c3:fb:88:c1:97:ab:ac:c5:9a:66:54:66:0e:f6:28:17] modulus: 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 public exponent: 10001 ] 2021-11-21 11:43:15.260  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:43:15.261 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:43:15.263 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-21 11:43:15.264 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:43:15.265  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-21 11:43:15.265  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:43:15.266  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:43:15.266 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:43:15.267 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:43:15.267 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:43:15.274 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:43:15.275 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:43:15.275 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:43:15.276 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:43:15.413  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:43:15.414  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:43:15.415 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:43:15.415 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:43:15.417  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:43:15.417  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:43:15.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:43:15.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:43:15.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:43:15.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:43:15.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:43:15.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:43:15.421 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:43:15.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:43:15.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:43:15.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:43:15.427 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:38:f7:15:47:f5:09:04:dd:f1:54:9f:b5:d4:30:0e:9c:50:05:11] modulus: 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 public exponent: 10001 ] 2021-11-21 11:43:50.648  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:43:50.650 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:43:50.652 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-21 11:43:50.653 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:43:50.653  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-21 11:43:50.654  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:43:50.654  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:43:50.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:43:50.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:43:50.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:43:50.662 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:43:50.662 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:43:50.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:43:50.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:43:50.810  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:43:50.811  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:43:50.811 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:43:50.811 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:43:50.813  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:43:50.814  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:43:50.814 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:43:50.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:43:50.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:43:50.816 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:43:50.817 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:43:50.818 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:43:50.819 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:43:50.820 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:43:50.820 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:43:50.821 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:43:50.825 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 93afb532e1ac0e71f37f97cac7d654af86ea185e63247c522be4ef2f73c2fcb6f577ba1290412c2cc44777f2f4e68fe7d657bafc9189eac46af10a33290402e212f9802ae28f60698a0b304c81c1f8fd067780fa0aef54a90bb7ef6a9cefb72809bf932bd1179233c54a34da649b4c2115eb5d85c862bbc31f5343cc4e6aa53bebb065b2bfb2811d817749d206df7d0fdac9a6e0c72007c9c403d4f660ae600e856ca3861ce15ce23f6b41a6557c8b9651d35360c0d3b99ac6b170f933188fbaf234e65d7f7ef52155d163518ceac0e385d68ae2f17e4f1967bcb9294f9b533d6072d6d8802cc7528dd482257c7e1cb6d5b62b0f78de891135441db08163f963e5c672f208d6ccc2ab7592b301989d3cfda130cb0dae9fba06f108b0eee25f34d6c2a2fc04a1db99eed2925b849055849c4dabb25000191131832c2e6f38663594a8b3788e18a867c409907dd96c15cd8be37d38a06a78d39a3410bd3b81081ac93e07d22f63aa116724098456711bce8eccef10bafdc08325bb31f14f2bff0d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:b6:14:11:fb:8c:6a:90:f5:72:b3:3a:4e:40:97:fd:9a:24:cb:38] modulus: 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 public exponent: 10001 ] 2021-11-21 11:45:56.950  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:45:56.953 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:45:56.956 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-21 11:45:56.957 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:45:56.957  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-21 11:45:56.958  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:45:56.959  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:45:56.959 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:45:56.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:45:56.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:45:56.969 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:45:56.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:45:56.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:45:56.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:45:57.125  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:45:57.126  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:45:57.126 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:45:57.126 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:45:57.128  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:45:57.129  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:45:57.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:45:57.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:45:57.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:45:57.131 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:45:57.131 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:45:57.131 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:45:57.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:45:57.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:45:57.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:45:57.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:45:57.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:21:2a:ce:52:c4:84:c5:ec:79:e4:18:44:22:ce:18:74:06:6c:c1] modulus: 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 public exponent: 10001 ] 2021-11-21 11:54:15.138  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:54:15.141 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:54:15.144 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-21 11:54:15.145 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:54:15.146  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-21 11:54:15.146  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:54:15.147  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:54:15.147 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:54:15.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:54:15.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:54:15.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:54:15.155 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:54:15.155 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:54:15.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:54:15.303  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:54:15.304  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:54:15.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:54:15.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:54:15.307  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:54:15.308  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:54:15.308 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:54:15.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:54:15.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:54:15.310 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:54:15.310 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:54:15.311 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:54:15.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:54:15.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:54:15.317 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:54:15.319 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:54:15.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0b:d5:7a:5c:4d:b2:a2:1a:13:9c:a7:4b:da:cd:b5:1a:28:cd:79:c6] modulus: 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 public exponent: 10001 ] 2021-11-21 11:58:03.981  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:58:03.983 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:58:03.986 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-21 11:58:03.987 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:58:03.987  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-21 11:58:03.988  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:58:03.988  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:58:03.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:58:03.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:58:03.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:58:03.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:58:03.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:58:04.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:58:04.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:58:04.154  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:58:04.155  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:58:04.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:58:04.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:58:04.157  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:58:04.157  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:58:04.158 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:58:04.158 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:58:04.158 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:58:04.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:58:04.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:58:04.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:58:04.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:58:04.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:58:04.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:58:04.163 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:58:04.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bd:f4:6f:b5:bf:c3:9d:d6:da:74:ea:92:4e:a9:15:53:76:11:2e:c9] modulus: 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 public exponent: 10001 ] 2021-11-21 11:58:37.114  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:58:37.115 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:58:37.117 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-21 11:58:37.117 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:58:37.118  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-21 11:58:37.119  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:58:37.120  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:58:37.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:58:37.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:58:37.122 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:58:37.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:58:37.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:58:37.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:58:37.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:58:37.289  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:58:37.290  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:58:37.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:58:37.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:58:37.292  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:58:37.292  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:58:37.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:58:37.293 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:58:37.293 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:58:37.294 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:58:37.294 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:58:37.295 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:58:37.295 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:58:37.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:58:37.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:58:37.297 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:58:37.300 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:37:8a:89:a0:80:be:74:23:85:f8:96:59:2e:53:46:56:6c:22:51] modulus: b3d1c035a6819d026ca7bcdaa7ba9ca0ed04ae6fb18e9b2b03cfc540b78cdc7975414f8d156daf99ca54d4ffc7e8620ef551f41361db06ab4ea86ea03ce9a87bf25e3d3d17d45b87c3d86aee0891dd18477f0396bc04b35a73c0c454492e668a12138008c51cdf9632936e9e5611c148c8c49c7da358235cd152f64ffc6947a840f35384e94bf223f030d459e524cd15acbdabc567a0377b67affbbcc72cfaa1fe94d6091829cc93c9bc9f6b76cf85afdb507cab9eb9e4d81414c89c4ad7b7ce3ae7662f19d137da7aff07df297ac35e3a0e3b7359523ba891f935b36d2982a2a69a4dbf51792cd2295a0cd4c9bd940d49c089ecc5d11e8719cfc4eb68511c95 public exponent: 10001 ] 2021-11-21 11:59:10.989  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 11:59:10.992 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 11:59:10.993 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-21 11:59:10.995 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 11:59:10.995  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-21 11:59:10.996  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 11:59:10.996  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 11:59:10.997 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 11:59:10.997 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 11:59:10.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 11:59:11.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 11:59:11.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:59:11.004 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 11:59:11.004 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:59:11.124  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 11:59:11.124  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 11:59:11.125 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 11:59:11.125 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 11:59:11.126  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 11:59:11.127  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 11:59:11.127 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:59:11.128 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:59:11.128 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:59:11.129 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:59:11.129 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:59:11.130 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:59:11.130 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 11:59:11.131 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 11:59:11.131 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 11:59:11.132 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 11:59:11.140 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:4e:c5:3f:d0:cf:75:72:b0:5b:ef:30:1a:6f:a3:3e:59:a8:5b:f3] modulus: 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 public exponent: 10001 ] 2021-11-21 12:02:39.522  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 12:02:39.525 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 12:02:39.527 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-21 12:02:39.528 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 12:02:39.529  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-21 12:02:39.529  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 12:02:39.530  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 12:02:39.530 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 12:02:39.531 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 12:02:39.531 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 12:02:39.538 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 12:02:39.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 12:02:39.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 12:02:39.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 12:02:39.682  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 12:02:39.682  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 12:02:39.683 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 12:02:39.683 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 12:02:39.684  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 12:02:39.685  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 12:02:39.685 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:02:39.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:02:39.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:02:39.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:02:39.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:02:39.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:02:39.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:02:39.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:02:39.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:02:39.689 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 12:02:39.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:54:ef:9c:10:e5:05:66:d6:d1:c7:cd:e9:06:7e:72:ff:4f:2c:0d] modulus: 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 public exponent: 10001 ] 2021-11-21 12:06:49.633  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 12:06:49.635 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 12:06:49.638 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-21 12:06:49.639 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 12:06:49.639  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-21 12:06:49.640  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 12:06:49.640  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 12:06:49.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 12:06:49.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 12:06:49.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 12:06:49.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 12:06:49.648 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 12:06:49.648 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 12:06:49.648 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 12:06:49.817  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 12:06:49.818  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 12:06:49.818 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 12:06:49.819 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 12:06:49.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 12:06:49.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 12:06:49.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:06:49.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:06:49.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:06:49.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:06:49.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:06:49.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:06:49.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:06:49.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:06:49.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:06:49.824 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 12:06:49.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:29:f9:29:e5:3a:fa:c6:5d:50:66:e8:13:86:c5:e8:fa:0f:e5:c2] modulus: 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 public exponent: 10001 ] 2021-11-21 12:07:21.539  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 12:07:21.541 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 12:07:21.543 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-21 12:07:21.543 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 12:07:21.544  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-21 12:07:21.544  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 12:07:21.545  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 12:07:21.545 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 12:07:21.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 12:07:21.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 12:07:21.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 12:07:21.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 12:07:21.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 12:07:21.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 12:07:21.699  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 12:07:21.700  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 12:07:21.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 12:07:21.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 12:07:21.703  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 12:07:21.703  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 12:07:21.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:07:21.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:07:21.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:07:21.705 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:07:21.705 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:07:21.705 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:07:21.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:07:21.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:07:21.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:07:21.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 12:07:21.712 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:30:74:00:e8:a4:76:30:f4:8f:4f:f7:c6:1c:cc:b7:04:10:3d:d2] modulus: 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 public exponent: 10001 ] 2021-11-21 12:07:56.058  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 12:07:56.060 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 12:07:56.062 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-21 12:07:56.063 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 12:07:56.064  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-21 12:07:56.064  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 12:07:56.065  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 12:07:56.065 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 12:07:56.066 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 12:07:56.066 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 12:07:56.071 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 12:07:56.071 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 12:07:56.072 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 12:07:56.072 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 12:07:56.223  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 12:07:56.224  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 12:07:56.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 12:07:56.224 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 12:07:56.226  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 12:07:56.226  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 12:07:56.226 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:07:56.227 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:07:56.227 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:07:56.228 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:07:56.228 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:07:56.228 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:07:56.229 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:07:56.229 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:07:56.230 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:07:56.231 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 12:07:56.235 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 93afb532e1ac0e71f37f97cac7d654af86ea185e63247c522be4ef2f73c2fcb6f577ba1290412c2cc44777f2f4e68fe7d657bafc9189eac46af10a33290402e212f9802ae28f60698a0b304c81c1f8fd067780fa0aef54a90bb7ef6a9cefb72809bf932bd1179233c54a34da649b4c2115eb5d85c862bbc31f5343cc4e6aa53bebb065b2bfb2811d817749d206df7d0fdac9a6e0c72007c9c403d4f660ae600e856ca3861ce15ce23f6b41a6557c8b9651d35360c0d3b99ac6b170f933188fbaf234e65d7f7ef52155d163518ceac0e385d68ae2f17e4f1967bcb9294f9b533d6072d6d8802cc7528dd482257c7e1cb6d5b62b0f78de891135441db08163f963e5c672f208d6ccc2ab7592b301989d3cfda130cb0dae9fba06f108b0eee25f34d6c2a2fc04a1db99eed2925b849055849c4dabb25000191131832c2e6f38663594a8b3788e18a867c409907dd96c15cd8be37d38a06a78d39a3410bd3b81081ac93e07d22f63aa116724098456711bce8eccef10bafdc08325bb31f14f2bff0d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:df:60:95:25:5c:44:5d:20:86:3c:f9:61:c8:27:42:a9:1f:c1:8b] modulus: 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 public exponent: 10001 ] 2021-11-21 12:09:42.498  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-21 12:09:42.500 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-21 12:09:42.502 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-21 12:09:42.503 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-21 12:09:42.504  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-21 12:09:42.504  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-21 12:09:42.505  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-21 12:09:42.505 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-21 12:09:42.505 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-21 12:09:42.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-21 12:09:42.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-21 12:09:42.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 12:09:42.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-21 12:09:42.513 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 12:09:42.641  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-21 12:09:42.641  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-21 12:09:42.642 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-21 12:09:42.642 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-21 12:09:42.643  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-21 12:09:42.644  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-21 12:09:42.644 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:09:42.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:09:42.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:09:42.646 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:09:42.646 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:09:42.646 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:09:42.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-21 12:09:42.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-21 12:09:42.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-21 12:09:42.648 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-21 12:09:42.652 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 706308285838730324594986545782061984430126021136 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 21 09:16:06 UTC 2021 Final Date: Fri Nov 21 09:16:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:99:5c:55:13:b6:44:76:a5:a8:e7:4a:b6:56:28:cd:5b:36:96:d0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55837b045098e7315bd66ffa425428654731c378 802e935dc965eca2e5548c13cccbcc7324d017d8 171d384fc56215ab8e01e9cd00a33d3d31e50881 3cb1c15d5ca1066877fed72067897af46cf0f38e 6b961ad8ed921cf88af76b920a0bde636b7113ab f126251e50a225086b5172a525268add04bf60ba f1aefd6e15db81fd7c823a1dd794752c45e0127b f3c824a7cbacde1c809dfb4c464263a519aa556e 779165b0eb2d63eff2bd9413dda16e5f7ce39b1f fe118d0e52eecdcbcf15f18b657f0c73d48838f6 8cb9f1a122c16c13ffb0f27837d5dfc441514396 ea2b7c9f2ac7dd63fb2045f3eb18f6add4a42ced 66df61ae4d679f5046995043f85b85e34274d0c9 7ce063593f68ca373382c154322ac0a4667a7a83 3bb813b9273f489f46cd3a4a0cf66c76aead4180 b4b9941a636a58345174c1d658434371bfd4b7ac 82d907fe4cab19636d270e9f59949fdc1853d0a8 cd8f446239a0e69331fe46bff32003437e99e4a7 9d56fd19673e72abf8e12df54299c38e088feb35 c4d50ea4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [55:f0:34:67:13:1f:03:5a:aa:f2:29:58:b3:e8:1c:96:57:7f:7a:6d] modulus: b493629e561d524f386f331c355b95af999dedc9401e37a4c9f6d1f65466fa37b4f2f406f5eb83f580dfd8af457babe21a1718c5bc6a44966d50c1e31235c86541c39e93ec537493c1e0e00f48e2d6349a6b67d013e433826f59f35e899d0e5494b318c8fa7679d7869f8998a4732f2138c0eea435b361d1586a9c5f4d07d52dfdaee047ae0f41f949ce6aebfe329e83bc338b9b2be0df1d2d2b8321866eae5795dcb80523d5c8c058f397075d80bd0092d225478a095d845b467eba3f0b5f03b4dbf67e114213e3133c8504d44a1bd53fc623b74afd17d8659a2f811afc7a85bde36e6759d17e0685810b0e4f305e0808b79a029a73fbb5ce22eb7b4b897fa7 public exponent: 10001 ]