2021-11-24 09:31:54,595 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-24 09:31:55,400 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-24 09:31:56.174  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-24 09:31:59.275 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-24 09:31:59.523  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-24 09:31:59.668  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-24 09:32:01.748  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.807 seconds (JVM running for 9.559) 2021-11-24 09:32:45.740  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 09:32:45.752 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 09:32:45.795 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-24 09:32:45.799 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 09:32:45.822  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-24 09:32:45.826  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 09:32:45.827  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 09:32:45.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 09:32:45.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 09:32:45.834 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 09:32:45.841 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 09:32:45.844 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 09:32:45.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 09:32:45.896 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 09:32:45.896 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 09:32:45.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 09:32:46.793  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 09:32:46.797  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 09:32:46.798 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 09:32:46.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 09:32:46.810  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 09:32:46.811  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 09:32:46.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 09:32:46.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 09:32:46.814 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 09:32:46.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 09:32:46.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 09:32:46.840 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 09:32:46.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 09:32:46.847 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 09:32:46.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 09:32:46.850 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 09:32:46.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:52:82:95:a7:7b:8d:9a:57:31:ce:55:91:ed:22:b4:a5:ec:4e:98] modulus: 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 public exponent: 10001 ] 2021-11-24 11:25:04.012  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 11:25:04.015 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 11:25:04.018 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-24 11:25:04.019 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:25:04.020  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-24 11:25:04.021  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 11:25:04.021  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 11:25:04.022 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 11:25:04.022 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 11:25:04.023 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 11:25:04.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 11:25:04.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:25:04.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:25:04.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:25:04.238  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 11:25:04.239  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 11:25:04.240 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 11:25:04.240 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:25:04.243  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 11:25:04.245  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 11:25:04.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:25:04.246 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:25:04.246 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:25:04.247 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:25:04.248 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:25:04.248 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:25:04.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:25:04.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:25:04.250 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:25:04.252 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:25:04.258 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: a3a545998544ef6d30e7608e82159dd7daa1c1ce059a69def972ae385bc79f7987587febbdff4ef946e2285d93ce468e51b00a6653823949bc6e9ea1b8ffbcbd3f23191d161f85b2c9a7b8802ed360988258884bb472a7d25fcc53ed0916cf21a92754b2e2396e96628b3e940c39c455fd74b05b88d5fadc454ce5f47a5f6b071544f2601337c3d0505692f06ebf20b1d373b14591e9e322fc41891fc1145c6b759a3e4cf3787c401b98e0182934cb3156a441697574efedb6aeedb4f92f4803b0f3e2c3db415cfc92e82d561c504a1578fbec8c3aece9e25e03408d77ae9e96cb54ecff58c4f51f6c2f322754ee556115b8d89cdaabf1f080307be297309fbbfdea3b4aba83e469c12c3e609159cd9717c7174d7481368a49ea2617b7155fcba2fdf46384c3cc6dd61259f4f027ec7aea3e129f423fdcac72ad2fe9c17161c620879d406fe68795f37e9414aecd06d8e21ed14d9b13d8d8a3bb0d134629ea990bf3a7ae1597299aceb30f12443039000b6a7e9bafbc918d820b625a6028e6f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:c4:28:ed:76:4d:39:18:66:e2:ff:93:9e:05:7b:b4:98:b3:99:88] modulus: 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 public exponent: 10001 ] 2021-11-24 11:26:36.516  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 11:26:36.519 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 11:26:36.523 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 11:26:36.524 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:26:36.525  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 11:26:36.526  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 11:26:36.526  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 11:26:36.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 11:26:36.527 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 11:26:36.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 11:26:36.533 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 11:26:36.534 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:26:36.535 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:26:36.535 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:26:36.728  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 11:26:36.729  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 11:26:36.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 11:26:36.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:26:36.732  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 11:26:36.733  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 11:26:36.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:26:36.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:26:36.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:26:36.736 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:26:36.737 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:26:36.737 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:26:36.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:26:36.739 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:26:36.739 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:26:36.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:26:36.745 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:00:46:8c:2d:b9:25:80:4c:1e:45:ff:42:49:f0:4d:6c:9a:48:7e] modulus: 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 public exponent: 10001 ] 2021-11-24 11:28:10.615  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 11:28:10.618 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 11:28:10.622 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:28:10.624 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:28:10.624  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:28:10.625  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 11:28:10.626  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 11:28:10.626 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 11:28:10.627 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 11:28:10.627 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 11:28:10.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 11:28:10.634 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:28:10.634 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:28:10.634 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:28:10.839  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 11:28:10.840  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 11:28:10.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 11:28:10.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:28:10.843  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 11:28:10.844  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 11:28:10.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:28:10.845 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:28:10.845 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:28:10.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:28:10.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:28:10.846 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:28:10.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:28:10.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:28:10.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:28:10.849 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:28:10.855 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:2b:4c:f9:95:01:11:fd:5e:d1:21:44:da:33:78:51:88:26:e4:c8] modulus: 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 public exponent: 10001 ] 2021-11-24 11:29:37.247  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 11:29:37.249 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 11:29:37.252 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:29:37.253 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:29:37.254  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:29:37.254  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 11:29:37.255  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 11:29:37.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 11:29:37.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 11:29:37.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 11:29:37.262 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 11:29:37.262 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:29:37.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:29:37.263 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:29:37.454  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 11:29:37.454  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 11:29:37.455 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 11:29:37.455 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:29:37.457  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 11:29:37.458  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 11:29:37.458 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:29:37.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:29:37.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:29:37.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:29:37.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:29:37.461 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:29:37.462 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:29:37.462 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:29:37.462 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:29:37.463 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:29:37.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: a3a545998544ef6d30e7608e82159dd7daa1c1ce059a69def972ae385bc79f7987587febbdff4ef946e2285d93ce468e51b00a6653823949bc6e9ea1b8ffbcbd3f23191d161f85b2c9a7b8802ed360988258884bb472a7d25fcc53ed0916cf21a92754b2e2396e96628b3e940c39c455fd74b05b88d5fadc454ce5f47a5f6b071544f2601337c3d0505692f06ebf20b1d373b14591e9e322fc41891fc1145c6b759a3e4cf3787c401b98e0182934cb3156a441697574efedb6aeedb4f92f4803b0f3e2c3db415cfc92e82d561c504a1578fbec8c3aece9e25e03408d77ae9e96cb54ecff58c4f51f6c2f322754ee556115b8d89cdaabf1f080307be297309fbbfdea3b4aba83e469c12c3e609159cd9717c7174d7481368a49ea2617b7155fcba2fdf46384c3cc6dd61259f4f027ec7aea3e129f423fdcac72ad2fe9c17161c620879d406fe68795f37e9414aecd06d8e21ed14d9b13d8d8a3bb0d134629ea990bf3a7ae1597299aceb30f12443039000b6a7e9bafbc918d820b625a6028e6f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:59:7a:45:35:07:91:b0:57:00:82:dd:9e:f1:ed:1c:65:f3:ac:da] modulus: c460b67ec29b9f6f59a8b6cefec158b8abf6dfd30515124eba4c54773a3d74a301c63971ac57e5df1699377d72c165558b1f4ddc5b236a4ef759dba51140b83758f3ea0046c6039664d64de20f21b83f18ff032402cf8c71004b75b199b2fb264bc203f1ffda9167b357214d30d9b9252b46bc7226214b2f08a8c9eaa6a5a7c46decd5431c1bc737e4d3de65bc6d6fd8ba9e11e66311b6b6aedf63d401648de937a9d89e21dbbadedf41909c15f991cd0b1fd843c0abb0e91d683966109891d145537f28dcc1fad57b6fd2d2b157a65db3b97562f2c4ff92b862215e702f8cce4ba659f1838873b2f9ece39a704d2eba198aef97e5c50bc004cac5c0c9fed643 public exponent: 10001 ] 2021-11-24 11:30:09.241  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 11:30:09.242 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 11:30:09.243 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-24 11:30:09.244 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:30:09.244  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-24 11:30:09.245  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 11:30:09.245  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 11:30:09.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 11:30:09.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 11:30:09.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 11:30:09.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 11:30:09.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:30:09.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:30:09.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:09.392  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 11:30:09.393  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 11:30:09.393 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 11:30:09.393 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:09.395  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 11:30:09.395  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 11:30:09.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:09.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:09.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:09.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:09.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:09.398 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:09.398 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:09.399 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:09.399 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:09.400 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:30:09.403 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: a3a545998544ef6d30e7608e82159dd7daa1c1ce059a69def972ae385bc79f7987587febbdff4ef946e2285d93ce468e51b00a6653823949bc6e9ea1b8ffbcbd3f23191d161f85b2c9a7b8802ed360988258884bb472a7d25fcc53ed0916cf21a92754b2e2396e96628b3e940c39c455fd74b05b88d5fadc454ce5f47a5f6b071544f2601337c3d0505692f06ebf20b1d373b14591e9e322fc41891fc1145c6b759a3e4cf3787c401b98e0182934cb3156a441697574efedb6aeedb4f92f4803b0f3e2c3db415cfc92e82d561c504a1578fbec8c3aece9e25e03408d77ae9e96cb54ecff58c4f51f6c2f322754ee556115b8d89cdaabf1f080307be297309fbbfdea3b4aba83e469c12c3e609159cd9717c7174d7481368a49ea2617b7155fcba2fdf46384c3cc6dd61259f4f027ec7aea3e129f423fdcac72ad2fe9c17161c620879d406fe68795f37e9414aecd06d8e21ed14d9b13d8d8a3bb0d134629ea990bf3a7ae1597299aceb30f12443039000b6a7e9bafbc918d820b625a6028e6f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:a5:de:6c:14:a7:e9:b7:27:0f:c1:43:09:9f:f3:91:d2:79:54:a2] modulus: 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 public exponent: 10001 ] 2021-11-24 11:30:40.667  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 11:30:40.675 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 11:30:40.678 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-24 11:30:40.679 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:30:40.681  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-24 11:30:40.685  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 11:30:40.686  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 11:30:40.697 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 11:30:40.698 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 11:30:40.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 11:30:40.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 11:30:40.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:30:40.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:30:40.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:40.887  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 11:30:40.888  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 11:30:40.888 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 11:30:40.888 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:40.890  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 11:30:40.890  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 11:30:40.891 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:40.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:40.893 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:40.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:40.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:40.896 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:40.897 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:40.897 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:40.897 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:40.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:30:40.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:7c:ce:ba:d5:37:f9:ce:42:11:32:a7:f5:d6:1e:db:6a:32:1a:16] modulus: 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 public exponent: 10001 ] 2021-11-24 11:30:41.655  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 11:30:41.656 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 11:30:41.658 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-24 11:30:41.658 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:30:41.659  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-24 11:30:41.659  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 11:30:41.660  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 11:30:41.660 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 11:30:41.660 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 11:30:41.661 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 11:30:41.666 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 11:30:41.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:30:41.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:30:41.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:41.760  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 11:30:41.761  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 11:30:41.761 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 11:30:41.762 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:30:41.763  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 11:30:41.764  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 11:30:41.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:41.765 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:41.765 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:41.765 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:41.766 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:41.766 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:41.767 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:30:41.767 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:30:41.767 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:30:41.768 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:30:41.773 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: a3a545998544ef6d30e7608e82159dd7daa1c1ce059a69def972ae385bc79f7987587febbdff4ef946e2285d93ce468e51b00a6653823949bc6e9ea1b8ffbcbd3f23191d161f85b2c9a7b8802ed360988258884bb472a7d25fcc53ed0916cf21a92754b2e2396e96628b3e940c39c455fd74b05b88d5fadc454ce5f47a5f6b071544f2601337c3d0505692f06ebf20b1d373b14591e9e322fc41891fc1145c6b759a3e4cf3787c401b98e0182934cb3156a441697574efedb6aeedb4f92f4803b0f3e2c3db415cfc92e82d561c504a1578fbec8c3aece9e25e03408d77ae9e96cb54ecff58c4f51f6c2f322754ee556115b8d89cdaabf1f080307be297309fbbfdea3b4aba83e469c12c3e609159cd9717c7174d7481368a49ea2617b7155fcba2fdf46384c3cc6dd61259f4f027ec7aea3e129f423fdcac72ad2fe9c17161c620879d406fe68795f37e9414aecd06d8e21ed14d9b13d8d8a3bb0d134629ea990bf3a7ae1597299aceb30f12443039000b6a7e9bafbc918d820b625a6028e6f3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:59:13:ec:b2:37:1d:c6:14:bf:1e:b9:b2:32:03:3e:fc:33:01:16] modulus: a7e253f7c4fffe00b916f81866ba69de4eed5800b44fe1a01eb22bb19f62bfd8297ab11fb6d65a33c0798edcecd438301eaa69f14f0774960498bbda8d2ac3c984ff06056efa91105a4a627c4a5bcf4980fbcf3380034de648122f74f57afa4945a772d8074d23f78eb000bee436d53d646497d835d177346c1df5263c74d6643b60d970ca6b5810920b28e22d3a38412ab5024632b2e54b4cc63e87746a3f09eebbaa45568d797228a9ded913d777b9938b06d2855ccb3321fdada60dac0fd5d0c7402f147a1e12843191eadca84ef2ee143b96459058f9e6ce03e72df37e6f941ea4230683af7dbd120fbf7888dfda29e0f4d1dd39669ac6766817d6b79bc7 public exponent: 10001 ] 2021-11-24 11:32:28.985  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 11:32:28.988 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 11:32:28.992 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 11:32:28.993 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:32:28.993  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 11:32:28.994  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 11:32:28.994  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 11:32:28.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 11:32:28.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 11:32:28.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 11:32:29.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 11:32:29.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:32:29.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:32:29.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:32:29.211  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 11:32:29.212  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 11:32:29.212 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 11:32:29.213 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:32:29.215  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 11:32:29.216  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 11:32:29.218 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:29.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:29.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:29.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:29.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:29.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:29.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:29.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:29.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:29.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:32:29.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:97:46:62:fa:f6:4a:6f:fd:fd:52:87:d0:47:d3:cb:33:86:33:e9] modulus: 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 public exponent: 10001 ] 2021-11-24 11:32:39.216  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 11:32:39.221 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 11:32:39.228 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:32:39.230 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 11:32:39.231  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 11:32:39.232  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 11:32:39.232  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 11:32:39.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 11:32:39.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 11:32:39.234 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 11:32:39.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 11:32:39.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:32:39.242 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 11:32:39.242 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:32:39.373  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 11:32:39.374  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 11:32:39.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 11:32:39.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 11:32:39.376  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 11:32:39.377  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 11:32:39.377 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:39.377 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:39.378 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:39.379 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:39.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:39.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:39.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 11:32:39.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 11:32:39.382 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 11:32:39.383 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 11:32:39.386 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 690313949343174674128531883564307845548015555876 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 09:28:28 UTC 2021 Final Date: Mon Nov 24 09:28:27 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b6:8c:61:65:6b:b5:df:fa:52:9a:d8:d2:37:f9:94:80:1a:33:d6:46] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9ab3b14af8c4a3a1d8442ef2790e0d22a106b16e ae516efba87f684b7d55b497c688ba6d5ad84a8a 55f00ed1d0aabf591403c32149cfcdfa0c1e091e 161103575f8ce060a12d1c15a471402b692d0fe6 be3d5454faa8b4826af4ed85f2a6222ac922e85b 42c127e9f7e9e449f472f098b952af0d630f2a36 138fea176e99b05cbe472c7366cd95b18f6c524f 90a337919b899c7e2413cd4eea0cff4eb340d7bb bf4fd3dfb5bae55654daeecea209b566c57b2d3d a3e567e729a221b827112537e62ad6f7b3fba3f3 9dce6be166a1b44fe3331c354722dfa591dcfaeb 33c4b990214aefb37b639d18cda8e2bdee265a2b beba4c3d7ee825187f53070cd0d1566255f9390e 1abdaaefdfa48a9244fb97fff5b80a664765b55d c3469fbeafc84812136e402ea8e47aedfe2fba40 633630c5a6ce492c04b2333e81e57b3340e9958e 0e38a3235e5bc248e64ed92fcae839047b674aaf 574404714a1d429a424dd21df0088b6c8d3c8cf5 55fc7e6f91f08d5ae7ebe6a5871f4fd1f72cbc61 c7628ead Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [41:c4:16:4b:ef:48:9b:ca:00:58:5c:96:96:01:04:96:04:c2:07:3f] modulus: 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 public exponent: 10001 ]