2021-11-24 02:17:19,767 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-24 02:17:24,184 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-24 02:17:27.480  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-24 02:17:42.182 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-24 02:17:43.197  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-24 02:17:43.866  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-24 02:17:56.779  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 39.592 seconds (JVM running for 46.742) 2021-11-24 02:19:31.179  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 02:19:31.271 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 02:19:31.475 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-24 02:19:31.477 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 02:19:31.487  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-24 02:19:31.564  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 02:19:31.565  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 02:19:31.568 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 02:19:31.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 02:19:31.572 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 02:19:31.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 02:19:31.580 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 02:19:31.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 02:19:31.968 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 02:19:31.969 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 02:19:31.973 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 02:19:33.581  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 02:19:33.666  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 02:19:33.667 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 02:19:33.671 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 02:19:33.679  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 02:19:33.680  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 02:19:33.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 02:19:33.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 02:19:33.682 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 02:19:33.777 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 02:19:33.777 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 02:19:33.777 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 02:19:33.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 02:19:33.784 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 02:19:33.863 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 02:19:33.867 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 02:19:33.986 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 283539479998784422044889220075699083499700064634 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 02:14:06 UTC 2021 Final Date: Mon Nov 24 02:14:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:b5:6a:ad:c3:e0:4a:de:9d:b3:7f:a6:da:bf:df:b8:3d:d0:dd:aa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 05360a599b6bbe9f98e4e4649f4d7f09f2874cb2 88010bdc3113926a942dd9b7685df48321e49f98 9e0d6c783a72aed684585d2d40a4daa9a148ee60 5c69c3e39c4aa2f728c30ec04ce1e175363aed3c 8e2c9f2f790bb9544638c5b18e6684ecac20dfb2 e0c537f91382854eea0c51b3435f4d2613fb5f7d 10a16988cd4edf830408f0e4df1ad9ceb650513f cb7e3b8c55c956d7b006aa350e94942be3a8287c 5844e277bbe53faf6ce97a190f575b9292bd54d6 8376c93688e8e93023f085f94cc99ace9cd4f3c7 bf2e0dc6b9cbf87eefeba6440c77be2c61cd123e 3f97fda71b4c229907a2cc07a043364e5a3e67ab 3e0ee8c798fa46b3a8b66390952327e6621cd934 4e2dc7af2cc813269c5b1c7337d5b6d101e4ff03 8348451a32542a23bc4dd009e663e16460e10933 c846f06cf70970f998defb74967afde42012dcb1 662e64e73fd2f4a593356339f2ab0a053ac7e82a 7eef178c117a82b9310ac5c746b514163f457b59 87de918adaa303350cb62fe02d77643a32382d00 3d847d4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:4b:60:78:d8:2e:f5:80:b2:58:ad:2d:aa:a3:94:b4:74:d3:4b:7d] modulus: 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 public exponent: 10001 ] 2021-11-24 09:58:54.965  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 09:58:54.966 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 09:58:54.968 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-24 09:58:54.969 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 09:58:54.970  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-24 09:58:54.971  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 09:58:54.971  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 09:58:54.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 09:58:54.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 09:58:54.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 09:58:54.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 09:58:54.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 09:58:54.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 09:58:54.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 09:58:55.264  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 09:58:55.265  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 09:58:55.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 09:58:55.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 09:58:55.271  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 09:58:55.272  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 09:58:55.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 09:58:55.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 09:58:55.274 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 09:58:55.276 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 09:58:55.363 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 09:58:55.364 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 09:58:55.365 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 09:58:55.366 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 09:58:55.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 09:58:55.368 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 09:58:55.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 283539479998784422044889220075699083499700064634 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 02:14:06 UTC 2021 Final Date: Mon Nov 24 02:14:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:b5:6a:ad:c3:e0:4a:de:9d:b3:7f:a6:da:bf:df:b8:3d:d0:dd:aa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 05360a599b6bbe9f98e4e4649f4d7f09f2874cb2 88010bdc3113926a942dd9b7685df48321e49f98 9e0d6c783a72aed684585d2d40a4daa9a148ee60 5c69c3e39c4aa2f728c30ec04ce1e175363aed3c 8e2c9f2f790bb9544638c5b18e6684ecac20dfb2 e0c537f91382854eea0c51b3435f4d2613fb5f7d 10a16988cd4edf830408f0e4df1ad9ceb650513f cb7e3b8c55c956d7b006aa350e94942be3a8287c 5844e277bbe53faf6ce97a190f575b9292bd54d6 8376c93688e8e93023f085f94cc99ace9cd4f3c7 bf2e0dc6b9cbf87eefeba6440c77be2c61cd123e 3f97fda71b4c229907a2cc07a043364e5a3e67ab 3e0ee8c798fa46b3a8b66390952327e6621cd934 4e2dc7af2cc813269c5b1c7337d5b6d101e4ff03 8348451a32542a23bc4dd009e663e16460e10933 c846f06cf70970f998defb74967afde42012dcb1 662e64e73fd2f4a593356339f2ab0a053ac7e82a 7eef178c117a82b9310ac5c746b514163f457b59 87de918adaa303350cb62fe02d77643a32382d00 3d847d4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:89:7f:9e:3e:f1:87:2f:d5:c6:54:0a:81:46:4c:87:6d:a0:ed:90] modulus: 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 public exponent: 10001 ] 2021-11-24 10:00:21.509  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 10:00:21.510 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 10:00:21.511 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 10:00:21.512 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 10:00:21.563  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 10:00:21.565  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 10:00:21.566  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 10:00:21.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 10:00:21.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 10:00:21.568 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 10:00:21.575 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 10:00:21.576 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:00:21.576 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:00:21.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:00:21.864  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 10:00:21.865  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 10:00:21.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 10:00:21.867 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:00:21.871  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 10:00:21.872  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 10:00:21.873 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:00:21.874 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:00:21.874 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:00:21.875 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:00:21.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:00:21.876 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:00:21.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:00:21.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:00:21.877 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:00:21.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 10:00:21.882 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 283539479998784422044889220075699083499700064634 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 02:14:06 UTC 2021 Final Date: Mon Nov 24 02:14:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:b5:6a:ad:c3:e0:4a:de:9d:b3:7f:a6:da:bf:df:b8:3d:d0:dd:aa] modulus: ac874ac542a559c49d3bd0142b77a2e8bcd664dd37f74d84a7941b267f0ec78cb762ae03686f9d44108f2e69ebadf880a9ec4cc8b4539aeb4191783e1aa77ff2846d9fc4b99b5a46c9d7d815dd4a07740f7c7e562339ed56c2a6868c6532e9359d7ce60f7bc21bc417bff99b2d483182716baaf755fc7f2a6b18904f22abb240bdd986d79288978df3f81d9824dc6738d996d107e8c026383cd68d04c96647510d68372fe330b1d443b580e89d390c209c46bdec3c182814e46020422af8be5cd3b06cc79cc1025efacbf518fde0c49d8ed535b59eb33226075737a4582cbc1bb67d88b15e36a4b3c30cfab56a7b068c44fe659667acd253843ce63f1b1992aa9d1a57310757e67fd1aed77822b35de9a3e333505b811547ac1eff3696a252b0c055936eb83c0cbc969c3c729e480a05256b81c699726ed3a2bd858b656e70e536519b076fd8551d2f369b132f0e8bd8364bb309cd8acc46cecb3750231464dfe5dff34571982e7e064c9536dcfce54aed506af16aef540c27d85bbe76d2930b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 05360a599b6bbe9f98e4e4649f4d7f09f2874cb2 88010bdc3113926a942dd9b7685df48321e49f98 9e0d6c783a72aed684585d2d40a4daa9a148ee60 5c69c3e39c4aa2f728c30ec04ce1e175363aed3c 8e2c9f2f790bb9544638c5b18e6684ecac20dfb2 e0c537f91382854eea0c51b3435f4d2613fb5f7d 10a16988cd4edf830408f0e4df1ad9ceb650513f cb7e3b8c55c956d7b006aa350e94942be3a8287c 5844e277bbe53faf6ce97a190f575b9292bd54d6 8376c93688e8e93023f085f94cc99ace9cd4f3c7 bf2e0dc6b9cbf87eefeba6440c77be2c61cd123e 3f97fda71b4c229907a2cc07a043364e5a3e67ab 3e0ee8c798fa46b3a8b66390952327e6621cd934 4e2dc7af2cc813269c5b1c7337d5b6d101e4ff03 8348451a32542a23bc4dd009e663e16460e10933 c846f06cf70970f998defb74967afde42012dcb1 662e64e73fd2f4a593356339f2ab0a053ac7e82a 7eef178c117a82b9310ac5c746b514163f457b59 87de918adaa303350cb62fe02d77643a32382d00 3d847d4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:2e:0a:17:bb:57:e4:b5:25:95:9b:9f:51:f2:10:30:bd:5b:31:fb] modulus: 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 public exponent: 10001 ] 2021-11-24 10:03:36.513  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 10:03:36.515 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 10:03:36.518 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 10:03:36.518 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 10:03:36.519  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 10:03:36.520  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 10:03:36.520  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 10:03:36.520 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 10:03:36.521 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 10:03:36.521 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 10:03:36.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 10:03:36.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:03:36.568 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:03:36.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:03:36.688  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 10:03:36.689  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 10:03:36.690 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 10:03:36.690 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:03:36.692  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 10:03:36.693  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 10:03:36.693 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:03:36.694 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:03:36.694 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:03:36.695 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:03:36.695 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:03:36.695 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:03:36.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:03:36.763 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:03:36.764 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:03:36.765 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 10:03:36.771 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 283539479998784422044889220075699083499700064634 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 02:14:06 UTC 2021 Final Date: Mon Nov 24 02:14:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:b5:6a:ad:c3:e0:4a:de:9d:b3:7f:a6:da:bf:df:b8:3d:d0:dd:aa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 05360a599b6bbe9f98e4e4649f4d7f09f2874cb2 88010bdc3113926a942dd9b7685df48321e49f98 9e0d6c783a72aed684585d2d40a4daa9a148ee60 5c69c3e39c4aa2f728c30ec04ce1e175363aed3c 8e2c9f2f790bb9544638c5b18e6684ecac20dfb2 e0c537f91382854eea0c51b3435f4d2613fb5f7d 10a16988cd4edf830408f0e4df1ad9ceb650513f cb7e3b8c55c956d7b006aa350e94942be3a8287c 5844e277bbe53faf6ce97a190f575b9292bd54d6 8376c93688e8e93023f085f94cc99ace9cd4f3c7 bf2e0dc6b9cbf87eefeba6440c77be2c61cd123e 3f97fda71b4c229907a2cc07a043364e5a3e67ab 3e0ee8c798fa46b3a8b66390952327e6621cd934 4e2dc7af2cc813269c5b1c7337d5b6d101e4ff03 8348451a32542a23bc4dd009e663e16460e10933 c846f06cf70970f998defb74967afde42012dcb1 662e64e73fd2f4a593356339f2ab0a053ac7e82a 7eef178c117a82b9310ac5c746b514163f457b59 87de918adaa303350cb62fe02d77643a32382d00 3d847d4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:2b:a4:61:b2:08:60:4e:9a:12:9f:a9:f9:ed:98:1f:53:b6:9b:a0] modulus: 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 public exponent: 10001 ] 2021-11-24 10:03:46.852  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 10:03:46.853 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 10:03:46.854 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 10:03:46.854 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 10:03:46.854  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-24 10:03:46.855  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 10:03:46.855  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 10:03:46.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 10:03:46.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 10:03:46.856 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 10:03:46.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 10:03:46.860 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:03:46.860 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:03:46.860 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:03:46.945  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 10:03:46.946  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 10:03:46.946 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 10:03:46.946 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:03:46.965  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 10:03:46.965  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 10:03:46.966 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:03:46.966 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:03:46.967 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:03:46.967 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:03:46.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:03:46.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:03:46.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:03:46.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:03:46.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:03:46.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 10:03:46.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 283539479998784422044889220075699083499700064634 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 02:14:06 UTC 2021 Final Date: Mon Nov 24 02:14:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:b5:6a:ad:c3:e0:4a:de:9d:b3:7f:a6:da:bf:df:b8:3d:d0:dd:aa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 05360a599b6bbe9f98e4e4649f4d7f09f2874cb2 88010bdc3113926a942dd9b7685df48321e49f98 9e0d6c783a72aed684585d2d40a4daa9a148ee60 5c69c3e39c4aa2f728c30ec04ce1e175363aed3c 8e2c9f2f790bb9544638c5b18e6684ecac20dfb2 e0c537f91382854eea0c51b3435f4d2613fb5f7d 10a16988cd4edf830408f0e4df1ad9ceb650513f cb7e3b8c55c956d7b006aa350e94942be3a8287c 5844e277bbe53faf6ce97a190f575b9292bd54d6 8376c93688e8e93023f085f94cc99ace9cd4f3c7 bf2e0dc6b9cbf87eefeba6440c77be2c61cd123e 3f97fda71b4c229907a2cc07a043364e5a3e67ab 3e0ee8c798fa46b3a8b66390952327e6621cd934 4e2dc7af2cc813269c5b1c7337d5b6d101e4ff03 8348451a32542a23bc4dd009e663e16460e10933 c846f06cf70970f998defb74967afde42012dcb1 662e64e73fd2f4a593356339f2ab0a053ac7e82a 7eef178c117a82b9310ac5c746b514163f457b59 87de918adaa303350cb62fe02d77643a32382d00 3d847d4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:be:ce:27:e9:9d:8f:3a:6b:83:41:68:93:47:f9:4c:41:43:05:8b] modulus: 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 public exponent: 10001 ] 2021-11-24 10:04:18.281  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 10:04:18.282 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 10:04:18.282 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-24 10:04:18.283 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 10:04:18.283  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-24 10:04:18.283  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 10:04:18.284  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 10:04:18.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 10:04:18.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 10:04:18.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 10:04:18.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 10:04:18.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:04:18.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:04:18.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:04:18.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 10:04:18.381  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 10:04:18.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 10:04:18.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:04:18.385  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 10:04:18.386  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 10:04:18.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:04:18.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:04:18.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:04:18.388 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:04:18.388 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:04:18.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:04:18.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:04:18.390 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:04:18.390 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:04:18.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 10:04:18.395 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 283539479998784422044889220075699083499700064634 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 02:14:06 UTC 2021 Final Date: Mon Nov 24 02:14:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:b5:6a:ad:c3:e0:4a:de:9d:b3:7f:a6:da:bf:df:b8:3d:d0:dd:aa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 05360a599b6bbe9f98e4e4649f4d7f09f2874cb2 88010bdc3113926a942dd9b7685df48321e49f98 9e0d6c783a72aed684585d2d40a4daa9a148ee60 5c69c3e39c4aa2f728c30ec04ce1e175363aed3c 8e2c9f2f790bb9544638c5b18e6684ecac20dfb2 e0c537f91382854eea0c51b3435f4d2613fb5f7d 10a16988cd4edf830408f0e4df1ad9ceb650513f cb7e3b8c55c956d7b006aa350e94942be3a8287c 5844e277bbe53faf6ce97a190f575b9292bd54d6 8376c93688e8e93023f085f94cc99ace9cd4f3c7 bf2e0dc6b9cbf87eefeba6440c77be2c61cd123e 3f97fda71b4c229907a2cc07a043364e5a3e67ab 3e0ee8c798fa46b3a8b66390952327e6621cd934 4e2dc7af2cc813269c5b1c7337d5b6d101e4ff03 8348451a32542a23bc4dd009e663e16460e10933 c846f06cf70970f998defb74967afde42012dcb1 662e64e73fd2f4a593356339f2ab0a053ac7e82a 7eef178c117a82b9310ac5c746b514163f457b59 87de918adaa303350cb62fe02d77643a32382d00 3d847d4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:ce:66:22:8b:75:e4:a8:b9:98:86:ad:2c:bb:3f:21:92:98:bc:8c] modulus: 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 public exponent: 10001 ] 2021-11-24 10:04:52.072  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 10:04:52.073 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 10:04:52.075 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-24 10:04:52.075 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 10:04:52.076  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-24 10:04:52.076  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 10:04:52.077  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 10:04:52.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 10:04:52.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 10:04:52.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 10:04:52.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 10:04:52.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:04:52.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:04:52.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:04:52.179  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 10:04:52.180  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 10:04:52.180 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 10:04:52.180 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:04:52.182  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 10:04:52.183  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 10:04:52.184 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:04:52.184 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:04:52.184 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:04:52.185 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:04:52.186 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:04:52.186 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:04:52.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:04:52.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:04:52.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:04:52.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 10:04:52.192 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 283539479998784422044889220075699083499700064634 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 02:14:06 UTC 2021 Final Date: Mon Nov 24 02:14:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:b5:6a:ad:c3:e0:4a:de:9d:b3:7f:a6:da:bf:df:b8:3d:d0:dd:aa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 05360a599b6bbe9f98e4e4649f4d7f09f2874cb2 88010bdc3113926a942dd9b7685df48321e49f98 9e0d6c783a72aed684585d2d40a4daa9a148ee60 5c69c3e39c4aa2f728c30ec04ce1e175363aed3c 8e2c9f2f790bb9544638c5b18e6684ecac20dfb2 e0c537f91382854eea0c51b3435f4d2613fb5f7d 10a16988cd4edf830408f0e4df1ad9ceb650513f cb7e3b8c55c956d7b006aa350e94942be3a8287c 5844e277bbe53faf6ce97a190f575b9292bd54d6 8376c93688e8e93023f085f94cc99ace9cd4f3c7 bf2e0dc6b9cbf87eefeba6440c77be2c61cd123e 3f97fda71b4c229907a2cc07a043364e5a3e67ab 3e0ee8c798fa46b3a8b66390952327e6621cd934 4e2dc7af2cc813269c5b1c7337d5b6d101e4ff03 8348451a32542a23bc4dd009e663e16460e10933 c846f06cf70970f998defb74967afde42012dcb1 662e64e73fd2f4a593356339f2ab0a053ac7e82a 7eef178c117a82b9310ac5c746b514163f457b59 87de918adaa303350cb62fe02d77643a32382d00 3d847d4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:f7:11:af:1b:69:94:ae:f5:2b:e0:d3:5e:85:d3:c3:04:fb:66:73] modulus: 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 public exponent: 10001 ] 2021-11-24 10:05:28.314  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 10:05:28.315 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 10:05:28.315 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-24 10:05:28.316 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 10:05:28.316  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-24 10:05:28.316  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 10:05:28.317  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 10:05:28.317 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 10:05:28.317 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 10:05:28.317 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 10:05:28.320 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 10:05:28.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:05:28.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:05:28.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:05:28.455  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 10:05:28.456  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 10:05:28.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 10:05:28.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:05:28.464  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 10:05:28.464  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 10:05:28.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:05:28.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:05:28.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:05:28.466 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:05:28.466 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:05:28.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:05:28.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:05:28.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:05:28.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:05:28.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 10:05:28.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 283539479998784422044889220075699083499700064634 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 02:14:06 UTC 2021 Final Date: Mon Nov 24 02:14:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:b5:6a:ad:c3:e0:4a:de:9d:b3:7f:a6:da:bf:df:b8:3d:d0:dd:aa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 05360a599b6bbe9f98e4e4649f4d7f09f2874cb2 88010bdc3113926a942dd9b7685df48321e49f98 9e0d6c783a72aed684585d2d40a4daa9a148ee60 5c69c3e39c4aa2f728c30ec04ce1e175363aed3c 8e2c9f2f790bb9544638c5b18e6684ecac20dfb2 e0c537f91382854eea0c51b3435f4d2613fb5f7d 10a16988cd4edf830408f0e4df1ad9ceb650513f cb7e3b8c55c956d7b006aa350e94942be3a8287c 5844e277bbe53faf6ce97a190f575b9292bd54d6 8376c93688e8e93023f085f94cc99ace9cd4f3c7 bf2e0dc6b9cbf87eefeba6440c77be2c61cd123e 3f97fda71b4c229907a2cc07a043364e5a3e67ab 3e0ee8c798fa46b3a8b66390952327e6621cd934 4e2dc7af2cc813269c5b1c7337d5b6d101e4ff03 8348451a32542a23bc4dd009e663e16460e10933 c846f06cf70970f998defb74967afde42012dcb1 662e64e73fd2f4a593356339f2ab0a053ac7e82a 7eef178c117a82b9310ac5c746b514163f457b59 87de918adaa303350cb62fe02d77643a32382d00 3d847d4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:93:7a:3b:88:68:cf:bd:63:42:64:81:77:d8:77:42:08:86:6d:d7] modulus: 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 public exponent: 10001 ] 2021-11-24 10:06:59.073  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-24 10:06:59.075 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-24 10:06:59.076 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 10:06:59.076 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-24 10:06:59.076  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-24 10:06:59.077  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-24 10:06:59.077  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-24 10:06:59.077 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-24 10:06:59.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-24 10:06:59.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-24 10:06:59.082 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-24 10:06:59.082 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:06:59.083 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-24 10:06:59.083 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:06:59.189  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-24 10:06:59.190  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-24 10:06:59.190 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-24 10:06:59.191 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-24 10:06:59.192  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-24 10:06:59.192  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-24 10:06:59.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:06:59.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:06:59.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:06:59.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:06:59.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:06:59.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:06:59.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-24 10:06:59.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-24 10:06:59.195 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-24 10:06:59.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-24 10:06:59.199 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 283539479998784422044889220075699083499700064634 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 24 02:14:06 UTC 2021 Final Date: Mon Nov 24 02:14:05 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [64:b5:6a:ad:c3:e0:4a:de:9d:b3:7f:a6:da:bf:df:b8:3d:d0:dd:aa] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 05360a599b6bbe9f98e4e4649f4d7f09f2874cb2 88010bdc3113926a942dd9b7685df48321e49f98 9e0d6c783a72aed684585d2d40a4daa9a148ee60 5c69c3e39c4aa2f728c30ec04ce1e175363aed3c 8e2c9f2f790bb9544638c5b18e6684ecac20dfb2 e0c537f91382854eea0c51b3435f4d2613fb5f7d 10a16988cd4edf830408f0e4df1ad9ceb650513f cb7e3b8c55c956d7b006aa350e94942be3a8287c 5844e277bbe53faf6ce97a190f575b9292bd54d6 8376c93688e8e93023f085f94cc99ace9cd4f3c7 bf2e0dc6b9cbf87eefeba6440c77be2c61cd123e 3f97fda71b4c229907a2cc07a043364e5a3e67ab 3e0ee8c798fa46b3a8b66390952327e6621cd934 4e2dc7af2cc813269c5b1c7337d5b6d101e4ff03 8348451a32542a23bc4dd009e663e16460e10933 c846f06cf70970f998defb74967afde42012dcb1 662e64e73fd2f4a593356339f2ab0a053ac7e82a 7eef178c117a82b9310ac5c746b514163f457b59 87de918adaa303350cb62fe02d77643a32382d00 3d847d4d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:b4:7c:59:f0:9a:8d:38:89:68:c9:c8:86:cf:ad:56:bf:04:2b:73] modulus: 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 public exponent: 10001 ]