2021-11-06 02:57:49,567 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-06 02:57:53,065 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-06 02:57:55.668  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-06 02:58:07.365 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-06 02:58:08.576  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-06 02:58:09.171  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-06 02:58:18.885  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 31.301 seconds (JVM running for 37.463) 2021-11-06 02:59:51.070  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-06 02:59:51.080 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-06 02:59:51.270 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-06 02:59:51.274 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 02:59:51.364  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-06 02:59:51.367  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-06 02:59:51.368  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-06 02:59:51.370 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-06 02:59:51.371 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 02:59:51.374 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-06 02:59:51.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-06 02:59:51.385 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-06 02:59:51.574 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-06 02:59:51.579 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 02:59:51.580 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 02:59:51.664 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 02:59:52.804  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-06 02:59:52.807  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-06 02:59:52.807 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-06 02:59:52.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 02:59:52.817  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-06 02:59:52.818  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-06 02:59:52.819 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 02:59:52.819 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 02:59:52.820 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 02:59:52.867 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 02:59:52.868 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 02:59:52.869 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 02:59:52.874 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 02:59:52.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 02:59:52.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 02:59:52.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 02:59:52.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: ceb6db9e4419c0263f4c93bd5941eb46a15ea17dc6e91ac768d1a0635b22ea51a6fff3333c51ab222f1b4344be2d6ac732e3f412db862008ed364f00bd51305db2db05fc4eead647d580957f98b5408e5b30ff87757369dbf9933a369d001cbde6e1b911f33342671503674e4de0f9c1264a2a0ba9a273817a10940fffb18359bc5ee31a21aab7ab2334656d6e7611a3b06865bd96d756fa7c998cbe9949619dcb72f6117c65d22636096d253937dcc46c174e0fc7e6b857fd4bfcb5967b9b0abd71589f2216fbfb3f4d145f8284cc56025fe94cc5550927b4527d6d07c32a72837de206652480ff496179fd963e57f015f8a73d3f82c8ec39cb81fe164089fc05e364e910d333ff3f69745d749d4802dba160cb3931f69d91591ace5a1615dfc0bcd8d6a53e8b7c9c6306cda7c57c5a2e64044ed80189274fab89362dd0c0b8197429bec65bab1c52f5cc5b05a007c85dfd230be92d544d4621ffcb9ca38240284050ae4f38abb1ad5245829140e2e6d3b4040e79dd4aa4e8fea54f80795f59 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:11:24:cb:3c:c5:2b:fd:93:bb:8a:4d:68:5d:36:a7:64:ef:09:84] modulus: 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 public exponent: 10001 ] 2021-11-06 07:03:29.537  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-06 07:03:29.539 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-06 07:03:29.542 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-06 07:03:29.563 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:03:29.565  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-06 07:03:29.566  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-06 07:03:29.566  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-06 07:03:29.567 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-06 07:03:29.567 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-06 07:03:29.568 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-06 07:03:29.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-06 07:03:29.577 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:03:29.577 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:03:29.578 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:03:29.882  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-06 07:03:29.883  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-06 07:03:29.883 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-06 07:03:29.883 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:03:29.886  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-06 07:03:29.887  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-06 07:03:29.887 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:03:29.888 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:03:29.888 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:03:29.889 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:03:29.889 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:03:29.890 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:03:29.891 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:03:29.891 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:03:29.891 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:03:29.892 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:03:29.897 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:7f:13:66:ac:81:e7:c2:8e:37:f6:fb:a4:ee:e5:5d:31:c3:39:8d] modulus: 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 public exponent: 10001 ] 2021-11-06 07:07:04.614  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-06 07:07:04.615 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-06 07:07:04.617 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-06 07:07:04.618 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:07:04.619  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-06 07:07:04.619  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-06 07:07:04.620  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-06 07:07:04.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-06 07:07:04.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-06 07:07:04.621 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-06 07:07:04.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-06 07:07:04.666 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:07:04.666 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:07:04.667 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:07:04.796  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-06 07:07:04.797  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-06 07:07:04.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-06 07:07:04.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:07:04.800  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-06 07:07:04.801  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-06 07:07:04.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:04.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:04.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:04.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:04.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:04.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:04.805 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:04.805 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:04.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:04.863 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:07:04.867 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:81:05:43:e4:da:3e:6e:94:40:8b:c0:d7:e8:ca:b2:7f:ca:9d:39] modulus: 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 public exponent: 10001 ] 2021-11-06 07:07:10.540  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-06 07:07:10.541 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-06 07:07:10.543 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-06 07:07:10.543 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:07:10.544  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-06 07:07:10.545  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-06 07:07:10.545  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-06 07:07:10.545 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-06 07:07:10.546 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-06 07:07:10.546 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-06 07:07:10.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-06 07:07:10.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:07:10.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:07:10.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:07:10.673  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-06 07:07:10.674  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-06 07:07:10.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-06 07:07:10.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:07:10.676  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-06 07:07:10.676  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-06 07:07:10.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:10.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:10.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:10.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:10.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:10.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:10.680 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:07:10.680 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:07:10.681 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:07:10.681 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:07:10.684 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:fa:af:7e:e4:80:2c:1a:f6:20:f0:56:bd:9a:45:f5:5b:60:c8:bb] modulus: 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 public exponent: 10001 ] 2021-11-06 07:09:18.608  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-06 07:09:18.609 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-06 07:09:18.610 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-06 07:09:18.611 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:09:18.611  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-06 07:09:18.612  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-06 07:09:18.612  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-06 07:09:18.613 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-06 07:09:18.613 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-06 07:09:18.614 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-06 07:09:18.619 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-06 07:09:18.620 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:09:18.620 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:09:18.620 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:09:18.763  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-06 07:09:18.763  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-06 07:09:18.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-06 07:09:18.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:09:18.766  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-06 07:09:18.767  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-06 07:09:18.768 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:09:18.768 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:09:18.768 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:09:18.769 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:09:18.770 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:09:18.770 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:09:18.771 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:09:18.772 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:09:18.772 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:09:18.774 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:09:18.779 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:22:5c:d2:22:2b:c5:7f:6c:f2:7d:3d:6c:73:3a:a4:98:e4:31:0e] modulus: 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 public exponent: 10001 ] 2021-11-06 07:11:54.131  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-06 07:11:54.133 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-06 07:11:54.134 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-06 07:11:54.135 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:11:54.135  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-06 07:11:54.136  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-06 07:11:54.136  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-06 07:11:54.137 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-06 07:11:54.137 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-06 07:11:54.138 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-06 07:11:54.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-06 07:11:54.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:11:54.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:11:54.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:11:54.240  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-06 07:11:54.240  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-06 07:11:54.240 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-06 07:11:54.241 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:11:54.262  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-06 07:11:54.263  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-06 07:11:54.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:11:54.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:11:54.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:11:54.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:11:54.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:11:54.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:11:54.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:11:54.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:11:54.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:11:54.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:11:54.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: ceb6db9e4419c0263f4c93bd5941eb46a15ea17dc6e91ac768d1a0635b22ea51a6fff3333c51ab222f1b4344be2d6ac732e3f412db862008ed364f00bd51305db2db05fc4eead647d580957f98b5408e5b30ff87757369dbf9933a369d001cbde6e1b911f33342671503674e4de0f9c1264a2a0ba9a273817a10940fffb18359bc5ee31a21aab7ab2334656d6e7611a3b06865bd96d756fa7c998cbe9949619dcb72f6117c65d22636096d253937dcc46c174e0fc7e6b857fd4bfcb5967b9b0abd71589f2216fbfb3f4d145f8284cc56025fe94cc5550927b4527d6d07c32a72837de206652480ff496179fd963e57f015f8a73d3f82c8ec39cb81fe164089fc05e364e910d333ff3f69745d749d4802dba160cb3931f69d91591ace5a1615dfc0bcd8d6a53e8b7c9c6306cda7c57c5a2e64044ed80189274fab89362dd0c0b8197429bec65bab1c52f5cc5b05a007c85dfd230be92d544d4621ffcb9ca38240284050ae4f38abb1ad5245829140e2e6d3b4040e79dd4aa4e8fea54f80795f59 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:40:1c:2a:17:29:e8:ad:b0:65:29:71:57:a9:86:4d:8a:1a:b4:96] modulus: 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 public exponent: 10001 ] 2021-11-06 07:12:25.482  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-06 07:12:25.483 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-06 07:12:25.484 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-06 07:12:25.485 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:12:25.485  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-06 07:12:25.486  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-06 07:12:25.486  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-06 07:12:25.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-06 07:12:25.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-06 07:12:25.488 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-06 07:12:25.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-06 07:12:25.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:12:25.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:12:25.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:12:25.637  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-06 07:12:25.663  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-06 07:12:25.664 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-06 07:12:25.664 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:12:25.666  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-06 07:12:25.666  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-06 07:12:25.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:25.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:25.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:25.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:25.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:25.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:25.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:25.671 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:25.671 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:25.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:12:25.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:42:c3:19:77:80:30:e5:b3:6b:0c:6c:c3:3b:51:73:b6:97:7d:48] modulus: c22328b38b16afcf5fc6a196c3cbe6c1a565d16e73e81fe4d281fbc63087073bd9863ee2d085266e494f37e5d2081fc85ecc4251e9fafcd319cf6a0463175ad2ddeb4e149d49341ff2bf0392b3839d9070ca6013160ae5ee1c4c3803c7ea6f87a8a5aa4f490f815da2b89e8a48345b7384936421b287a0ffafdbc5ceb311969000157d25350d3daa4bb5439826fa6fe16ee6326a6fef1c17cdfe5a58d7afea8fd5630b0e1fd27b26393ca293fa8c62550ee92a6273e0cdb7b4da8bbbce8f68a9cef5b03cdd0421994a2638bbe1f401925034f75ffeb0022a5bede66311f6e5f95194e16cb1d8a9c04c24cd80f617acb27a4ba73e0dc6bc4fc303910845ff7851 public exponent: 10001 ] 2021-11-06 07:12:58.128  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-06 07:12:58.129 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-06 07:12:58.131 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-06 07:12:58.132 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:12:58.132  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-06 07:12:58.133  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-06 07:12:58.133  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-06 07:12:58.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-06 07:12:58.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-06 07:12:58.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-06 07:12:58.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-06 07:12:58.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:12:58.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:12:58.141 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:12:58.232  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-06 07:12:58.233  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-06 07:12:58.233 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-06 07:12:58.233 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:12:58.264  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-06 07:12:58.264  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-06 07:12:58.264 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:58.265 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:58.265 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:58.266 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:58.266 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:58.266 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:58.267 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:12:58.267 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:12:58.267 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:12:58.268 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:12:58.271 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: ceb6db9e4419c0263f4c93bd5941eb46a15ea17dc6e91ac768d1a0635b22ea51a6fff3333c51ab222f1b4344be2d6ac732e3f412db862008ed364f00bd51305db2db05fc4eead647d580957f98b5408e5b30ff87757369dbf9933a369d001cbde6e1b911f33342671503674e4de0f9c1264a2a0ba9a273817a10940fffb18359bc5ee31a21aab7ab2334656d6e7611a3b06865bd96d756fa7c998cbe9949619dcb72f6117c65d22636096d253937dcc46c174e0fc7e6b857fd4bfcb5967b9b0abd71589f2216fbfb3f4d145f8284cc56025fe94cc5550927b4527d6d07c32a72837de206652480ff496179fd963e57f015f8a73d3f82c8ec39cb81fe164089fc05e364e910d333ff3f69745d749d4802dba160cb3931f69d91591ace5a1615dfc0bcd8d6a53e8b7c9c6306cda7c57c5a2e64044ed80189274fab89362dd0c0b8197429bec65bab1c52f5cc5b05a007c85dfd230be92d544d4621ffcb9ca38240284050ae4f38abb1ad5245829140e2e6d3b4040e79dd4aa4e8fea54f80795f59 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:69:60:76:54:78:90:04:2a:96:05:e5:af:a7:2b:af:a0:84:24:45] modulus: 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 public exponent: 10001 ] 2021-11-06 07:15:25.644  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-06 07:15:25.645 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-06 07:15:25.646 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-06 07:15:25.646 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-06 07:15:25.646  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-06 07:15:25.647  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-06 07:15:25.647  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-06 07:15:25.647 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-06 07:15:25.647 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-06 07:15:25.648 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-06 07:15:25.652 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-06 07:15:25.652 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:15:25.653 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-06 07:15:25.653 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:15:25.748  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-06 07:15:25.749  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-06 07:15:25.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-06 07:15:25.749 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-06 07:15:25.763  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-06 07:15:25.763  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-06 07:15:25.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:15:25.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:15:25.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:15:25.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:15:25.765 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:15:25.765 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:15:25.766 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-06 07:15:25.766 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-06 07:15:25.766 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-06 07:15:25.767 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-06 07:15:25.769 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 642045856221898757082093080056623088235823393900 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 06 02:52:43 UTC 2021 Final Date: Thu Nov 06 02:52:42 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [20:10:11:f5:3b:42:6b:8e:82:01:92:88:01:e6:11:bf:e6:84:d2:52] modulus: ceb6db9e4419c0263f4c93bd5941eb46a15ea17dc6e91ac768d1a0635b22ea51a6fff3333c51ab222f1b4344be2d6ac732e3f412db862008ed364f00bd51305db2db05fc4eead647d580957f98b5408e5b30ff87757369dbf9933a369d001cbde6e1b911f33342671503674e4de0f9c1264a2a0ba9a273817a10940fffb18359bc5ee31a21aab7ab2334656d6e7611a3b06865bd96d756fa7c998cbe9949619dcb72f6117c65d22636096d253937dcc46c174e0fc7e6b857fd4bfcb5967b9b0abd71589f2216fbfb3f4d145f8284cc56025fe94cc5550927b4527d6d07c32a72837de206652480ff496179fd963e57f015f8a73d3f82c8ec39cb81fe164089fc05e364e910d333ff3f69745d749d4802dba160cb3931f69d91591ace5a1615dfc0bcd8d6a53e8b7c9c6306cda7c57c5a2e64044ed80189274fab89362dd0c0b8197429bec65bab1c52f5cc5b05a007c85dfd230be92d544d4621ffcb9ca38240284050ae4f38abb1ad5245829140e2e6d3b4040e79dd4aa4e8fea54f80795f59 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 365dd4133b0b24621aaff98f32391d538d9e87f5 7f7d379c5619156e47088471a7d9d87dff8dac4e adac17beb569ca6cfadab17851ab38c20083d332 5714b3d1fb0af710f575a3497218bfd89f25f129 c4478070b665c25faea74457dad1c990066d3bb9 bf75987072e54cb8360b93289fca25dc1dac69ed f748f3a72cfb6c2662e57d62c016e4761ca2bb87 08c65b64fbba17379bcc76c863b96498141522d2 8e03b358bf37317cc6783e161b5d7c3586fbb68b 9a110324d8e212e3e084889c34652592ef3ee1ea d3888f5435d14db1f791fbffae4c5a5e896ba174 703b3aa5b471c2d73c42c07b484cf000cced68fa 248267b0487da7a04f13444dc81e13518a6c6ff6 72a95eb44deb882ec3d34729f4f2511329513b83 17474af54901d13b7ad1ea14d6d493ad4535be24 212fa737195b2e76c2943e48c9c697ae6a5f2b1b b733160ef388c157dccd63251eb33d88350b653b 7f4c50662f3f4add13440c035869313aee944f03 5afdfa714239873cdc74e4bd9199b56cffc84318 88679a8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bb:a6:3c:1d:6f:c9:55:94:7d:0f:ed:a7:6b:ab:46:02:6a:2d:e4:16] modulus: cf5f5e8e44fe1b99df24ef9f60c69e4a8b0b95123e01544e60d824ddf6407b6c10bee911a73e016997bc08cc943534d0da49e7cc6821af2fcce47c68474aba51de6d0f9e3d51dfd8e61e99f215c0ae653a36c9b637d9a42af3fa3b28065c79ac17b7656fd38074f8f0da6d07a6efb69fe73f41892d0325511a7fea1b0fb9f594498a5ca7ce55647f9d81209dc22df456b8d49612253824827826571600afe91fbedf8a7ac3c8670ec36044ca9a30d84e547535c0c229c63815167acd40145cfab4fc300d7bc9e9f19661a6366e3e23abcc04ba79319ca78cf65a6d0b31c9e6cd7a1bd394bfb5ef52ddd81abde68fbae75602b35f09d706e0609d19c08d55c25b public exponent: 10001 ]