2021-11-25 02:48:13,029 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-25 02:48:17,626 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-25 02:48:21.318  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-25 02:48:35.733 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-25 02:48:36.832  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-25 02:48:37.536  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-25 02:48:49.930  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 39.494 seconds (JVM running for 47.391) 2021-11-25 02:50:54.233  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-25 02:50:54.327 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-25 02:50:54.444 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-25 02:50:54.448 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-25 02:50:54.628  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-25 02:50:54.632  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-25 02:50:54.633  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-25 02:50:54.635 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-25 02:50:54.718 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 02:50:54.723 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-25 02:50:54.731 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-25 02:50:54.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-25 02:50:54.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-25 02:50:54.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 02:50:54.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 02:50:54.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 02:50:56.298  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-25 02:50:56.301  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-25 02:50:56.302 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-25 02:50:56.303 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 02:50:56.310  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-25 02:50:56.311  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-25 02:50:56.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 02:50:56.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 02:50:56.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 02:50:56.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 02:50:56.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 02:50:56.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 02:50:56.335 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 02:50:56.335 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 02:50:56.336 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 02:50:56.337 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-25 02:50:56.532 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 424623784547700729119033158968395978318974344899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 25 02:45:12 UTC 2021 Final Date: Tue Nov 25 02:45:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:5e:2e:b2:dd:af:c6:a0:88:f6:0b:2f:f2:31:1b:ec:31:7a:76:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33551b200a77b5c4e8104c7110a5b4e30ba22907 d6c356737f534a127d257a658e68f3d11763fcb3 6dd1aafdeb413366fd4c98dcc7ab83166df99341 bdeeeb774db5c61ac6fb407e13094f8ebf129c4a aa0bd19d1decfba2dd3cef6f93a07ed8e757145e 790a51408dd59f531ed2a7efdb9014182c4a7b9b 8bd4702c5f1018bbdd464e9f2d482718ce3a77c7 5f2f43d3a7529b279faba949e5d4ac6e09003bb2 0fba41eba2853735db2fc284f1294991aad79e10 07fa0c52f53e78ba573b84565f2cebad56555ed6 6e9e219b1084df42df1a3579abcdff8e419f6ffa 40adae32369a2547b40b85675e2119418cc53bf8 78fbe8750ed699b01fb662a773d4c01d9dff8c27 79e880f4ec0916c61fd49c1b97e95d38ba989f35 86de21306c7cd9fbba7ee847b71905c32bca9c92 b6045f9252fff20780890396aa05636bf9f61c0c c81294286dc64402a286ead200d288fbad433436 a291f8eb41700ed22b9caea4d9b69619fc71c233 8fb798eef9df710d1625782fe515defd4572edec f00ed075 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:49:37:33:5c:06:78:bc:7d:cb:9f:9b:23:7b:8f:e4:b4:7b:63:6a] modulus: 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 public exponent: 10001 ] 2021-11-25 03:59:25.942  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-25 03:59:25.944 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-25 03:59:25.946 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-25 03:59:25.947 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-25 03:59:25.948  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-25 03:59:25.948  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-25 03:59:25.949  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-25 03:59:25.949 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-25 03:59:25.949 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-25 03:59:25.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-25 03:59:25.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-25 03:59:25.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 03:59:26.018 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 03:59:26.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 03:59:26.254  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-25 03:59:26.255  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-25 03:59:26.256 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-25 03:59:26.257 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 03:59:26.260  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-25 03:59:26.260  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-25 03:59:26.261 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 03:59:26.261 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 03:59:26.261 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 03:59:26.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 03:59:26.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 03:59:26.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 03:59:26.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 03:59:26.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 03:59:26.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 03:59:26.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-25 03:59:26.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 424623784547700729119033158968395978318974344899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 25 02:45:12 UTC 2021 Final Date: Tue Nov 25 02:45:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:5e:2e:b2:dd:af:c6:a0:88:f6:0b:2f:f2:31:1b:ec:31:7a:76:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33551b200a77b5c4e8104c7110a5b4e30ba22907 d6c356737f534a127d257a658e68f3d11763fcb3 6dd1aafdeb413366fd4c98dcc7ab83166df99341 bdeeeb774db5c61ac6fb407e13094f8ebf129c4a aa0bd19d1decfba2dd3cef6f93a07ed8e757145e 790a51408dd59f531ed2a7efdb9014182c4a7b9b 8bd4702c5f1018bbdd464e9f2d482718ce3a77c7 5f2f43d3a7529b279faba949e5d4ac6e09003bb2 0fba41eba2853735db2fc284f1294991aad79e10 07fa0c52f53e78ba573b84565f2cebad56555ed6 6e9e219b1084df42df1a3579abcdff8e419f6ffa 40adae32369a2547b40b85675e2119418cc53bf8 78fbe8750ed699b01fb662a773d4c01d9dff8c27 79e880f4ec0916c61fd49c1b97e95d38ba989f35 86de21306c7cd9fbba7ee847b71905c32bca9c92 b6045f9252fff20780890396aa05636bf9f61c0c c81294286dc64402a286ead200d288fbad433436 a291f8eb41700ed22b9caea4d9b69619fc71c233 8fb798eef9df710d1625782fe515defd4572edec f00ed075 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4c:f8:9b:bf:24:0d:ed:4d:fc:f5:67:8e:a1:e0:af:30:a3:5c:f8:55] modulus: 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 public exponent: 10001 ] 2021-11-25 04:00:57.696  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-25 04:00:57.697 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-25 04:00:57.699 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-25 04:00:57.700 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-25 04:00:57.718  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-25 04:00:57.719  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-25 04:00:57.719  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-25 04:00:57.720 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-25 04:00:57.720 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-25 04:00:57.721 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-25 04:00:57.732 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-25 04:00:57.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:00:57.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:00:57.734 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:00:57.947  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-25 04:00:57.948  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-25 04:00:57.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-25 04:00:57.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:00:57.953  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-25 04:00:58.018  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-25 04:00:58.019 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:00:58.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:00:58.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:00:58.022 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:00:58.022 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:00:58.023 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:00:58.024 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:00:58.025 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:00:58.025 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:00:58.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-25 04:00:58.030 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 424623784547700729119033158968395978318974344899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 25 02:45:12 UTC 2021 Final Date: Tue Nov 25 02:45:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:5e:2e:b2:dd:af:c6:a0:88:f6:0b:2f:f2:31:1b:ec:31:7a:76:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33551b200a77b5c4e8104c7110a5b4e30ba22907 d6c356737f534a127d257a658e68f3d11763fcb3 6dd1aafdeb413366fd4c98dcc7ab83166df99341 bdeeeb774db5c61ac6fb407e13094f8ebf129c4a aa0bd19d1decfba2dd3cef6f93a07ed8e757145e 790a51408dd59f531ed2a7efdb9014182c4a7b9b 8bd4702c5f1018bbdd464e9f2d482718ce3a77c7 5f2f43d3a7529b279faba949e5d4ac6e09003bb2 0fba41eba2853735db2fc284f1294991aad79e10 07fa0c52f53e78ba573b84565f2cebad56555ed6 6e9e219b1084df42df1a3579abcdff8e419f6ffa 40adae32369a2547b40b85675e2119418cc53bf8 78fbe8750ed699b01fb662a773d4c01d9dff8c27 79e880f4ec0916c61fd49c1b97e95d38ba989f35 86de21306c7cd9fbba7ee847b71905c32bca9c92 b6045f9252fff20780890396aa05636bf9f61c0c c81294286dc64402a286ead200d288fbad433436 a291f8eb41700ed22b9caea4d9b69619fc71c233 8fb798eef9df710d1625782fe515defd4572edec f00ed075 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:c1:f2:bc:c0:a6:41:13:c4:00:b5:6f:9d:91:62:de:44:97:9f:a9] modulus: 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 public exponent: 10001 ] 2021-11-25 04:03:50.258  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-25 04:03:50.260 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-25 04:03:50.262 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-25 04:03:50.263 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-25 04:03:50.264  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-25 04:03:50.264  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-25 04:03:50.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-25 04:03:50.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-25 04:03:50.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-25 04:03:50.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-25 04:03:50.327 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-25 04:03:50.328 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:03:50.329 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:03:50.329 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:03:50.417  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-25 04:03:50.418  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-25 04:03:50.419 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-25 04:03:50.419 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:03:50.421  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-25 04:03:50.422  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-25 04:03:50.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:03:50.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:03:50.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:03:50.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:03:50.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:03:50.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:03:50.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:03:50.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:03:50.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:03:50.428 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-25 04:03:50.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 424623784547700729119033158968395978318974344899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 25 02:45:12 UTC 2021 Final Date: Tue Nov 25 02:45:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:5e:2e:b2:dd:af:c6:a0:88:f6:0b:2f:f2:31:1b:ec:31:7a:76:1a] modulus: c79c3d524556165c5d470dbfb809c159a4323774746b89a3ca8ac5e7f9f5195721bdc17f441083ae4354d94562133d90e32f2d347950755f2bad61a8cbc94e33e28059632c66d159f26377f048873c1cd8e3cd51c8e8ad3f0fa6eb72da04001db3dbd8e678e33f11426315418afbf8c27d91e1079db9c2ce66cd73180acf402c69734743703c7496e76029fc098d20d1d46aef9d0599466824f46a34e8e3ee2f85d846b172c9097d877366be2ba0a925ea1b0e6a50835aef9fab2f3c3d24e6bea2e129d14e5016220372f419ac58f0be84d1e5fc97b5245b8459e2177caa24d2668b6b32bdff5491ab161bfe9b5a7c603f6d781657ff9332d6f87279a8767078816911036a7d06688db28c3153649e59a6d1408b49f1d27928a56a4bff2c08a31374698f609c32bccac5a119415fb88af535baa78e8f570373b29064fc85f4b08dc19a003c520fc1b986aa214d262269d9dad21c6d05b1937284935c66a1f18394fd091fa53376595ed0054e8058c3087e6d7b98dfec59dc112265219d8c4957 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33551b200a77b5c4e8104c7110a5b4e30ba22907 d6c356737f534a127d257a658e68f3d11763fcb3 6dd1aafdeb413366fd4c98dcc7ab83166df99341 bdeeeb774db5c61ac6fb407e13094f8ebf129c4a aa0bd19d1decfba2dd3cef6f93a07ed8e757145e 790a51408dd59f531ed2a7efdb9014182c4a7b9b 8bd4702c5f1018bbdd464e9f2d482718ce3a77c7 5f2f43d3a7529b279faba949e5d4ac6e09003bb2 0fba41eba2853735db2fc284f1294991aad79e10 07fa0c52f53e78ba573b84565f2cebad56555ed6 6e9e219b1084df42df1a3579abcdff8e419f6ffa 40adae32369a2547b40b85675e2119418cc53bf8 78fbe8750ed699b01fb662a773d4c01d9dff8c27 79e880f4ec0916c61fd49c1b97e95d38ba989f35 86de21306c7cd9fbba7ee847b71905c32bca9c92 b6045f9252fff20780890396aa05636bf9f61c0c c81294286dc64402a286ead200d288fbad433436 a291f8eb41700ed22b9caea4d9b69619fc71c233 8fb798eef9df710d1625782fe515defd4572edec f00ed075 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:7a:f4:69:78:b8:0b:00:2d:c5:5e:e3:5a:c2:48:ce:5f:60:38:96] modulus: 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 public exponent: 10001 ] 2021-11-25 04:04:06.366  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-25 04:04:06.367 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-25 04:04:06.368 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-25 04:04:06.369 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-25 04:04:06.369  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-25 04:04:06.370  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-25 04:04:06.370  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-25 04:04:06.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-25 04:04:06.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-25 04:04:06.371 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-25 04:04:06.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-25 04:04:06.376 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:04:06.376 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:04:06.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:04:06.494  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-25 04:04:06.495  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-25 04:04:06.495 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-25 04:04:06.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:04:06.519  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-25 04:04:06.520  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-25 04:04:06.520 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:04:06.521 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:04:06.521 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:04:06.522 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:04:06.522 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:04:06.522 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:04:06.523 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:04:06.524 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:04:06.524 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:04:06.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-25 04:04:06.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 424623784547700729119033158968395978318974344899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 25 02:45:12 UTC 2021 Final Date: Tue Nov 25 02:45:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:5e:2e:b2:dd:af:c6:a0:88:f6:0b:2f:f2:31:1b:ec:31:7a:76:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33551b200a77b5c4e8104c7110a5b4e30ba22907 d6c356737f534a127d257a658e68f3d11763fcb3 6dd1aafdeb413366fd4c98dcc7ab83166df99341 bdeeeb774db5c61ac6fb407e13094f8ebf129c4a aa0bd19d1decfba2dd3cef6f93a07ed8e757145e 790a51408dd59f531ed2a7efdb9014182c4a7b9b 8bd4702c5f1018bbdd464e9f2d482718ce3a77c7 5f2f43d3a7529b279faba949e5d4ac6e09003bb2 0fba41eba2853735db2fc284f1294991aad79e10 07fa0c52f53e78ba573b84565f2cebad56555ed6 6e9e219b1084df42df1a3579abcdff8e419f6ffa 40adae32369a2547b40b85675e2119418cc53bf8 78fbe8750ed699b01fb662a773d4c01d9dff8c27 79e880f4ec0916c61fd49c1b97e95d38ba989f35 86de21306c7cd9fbba7ee847b71905c32bca9c92 b6045f9252fff20780890396aa05636bf9f61c0c c81294286dc64402a286ead200d288fbad433436 a291f8eb41700ed22b9caea4d9b69619fc71c233 8fb798eef9df710d1625782fe515defd4572edec f00ed075 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:9e:07:6f:d6:8b:32:77:50:fa:73:03:62:01:9b:05:ba:a2:16:18] modulus: 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 public exponent: 10001 ] 2021-11-25 04:04:38.948  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-25 04:04:38.950 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-25 04:04:38.951 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-25 04:04:39.018 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-25 04:04:39.018  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-25 04:04:39.019  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-25 04:04:39.020  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-25 04:04:39.020 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-25 04:04:39.020 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-25 04:04:39.021 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-25 04:04:39.027 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-25 04:04:39.028 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:04:39.028 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:04:39.028 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:04:39.194  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-25 04:04:39.194  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-25 04:04:39.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-25 04:04:39.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:04:39.219  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-25 04:04:39.220  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-25 04:04:39.221 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:04:39.221 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:04:39.222 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:04:39.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:04:39.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:04:39.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:04:39.224 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:04:39.225 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:04:39.225 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:04:39.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-25 04:04:39.230 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 424623784547700729119033158968395978318974344899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 25 02:45:12 UTC 2021 Final Date: Tue Nov 25 02:45:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:5e:2e:b2:dd:af:c6:a0:88:f6:0b:2f:f2:31:1b:ec:31:7a:76:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33551b200a77b5c4e8104c7110a5b4e30ba22907 d6c356737f534a127d257a658e68f3d11763fcb3 6dd1aafdeb413366fd4c98dcc7ab83166df99341 bdeeeb774db5c61ac6fb407e13094f8ebf129c4a aa0bd19d1decfba2dd3cef6f93a07ed8e757145e 790a51408dd59f531ed2a7efdb9014182c4a7b9b 8bd4702c5f1018bbdd464e9f2d482718ce3a77c7 5f2f43d3a7529b279faba949e5d4ac6e09003bb2 0fba41eba2853735db2fc284f1294991aad79e10 07fa0c52f53e78ba573b84565f2cebad56555ed6 6e9e219b1084df42df1a3579abcdff8e419f6ffa 40adae32369a2547b40b85675e2119418cc53bf8 78fbe8750ed699b01fb662a773d4c01d9dff8c27 79e880f4ec0916c61fd49c1b97e95d38ba989f35 86de21306c7cd9fbba7ee847b71905c32bca9c92 b6045f9252fff20780890396aa05636bf9f61c0c c81294286dc64402a286ead200d288fbad433436 a291f8eb41700ed22b9caea4d9b69619fc71c233 8fb798eef9df710d1625782fe515defd4572edec f00ed075 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:dc:2f:13:70:4a:8a:15:29:e0:95:51:65:c5:f4:39:03:00:3c:a5] modulus: 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 public exponent: 10001 ] 2021-11-25 04:05:11.468  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-25 04:05:11.469 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-25 04:05:11.471 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-25 04:05:11.472 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-25 04:05:11.473  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-25 04:05:11.473  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-25 04:05:11.474  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-25 04:05:11.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-25 04:05:11.475 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-25 04:05:11.475 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-25 04:05:11.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-25 04:05:11.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:05:11.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:05:11.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:05:11.620  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-25 04:05:11.621  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-25 04:05:11.621 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-25 04:05:11.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:05:11.623  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-25 04:05:11.624  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-25 04:05:11.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:05:11.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:05:11.625 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:05:11.626 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:05:11.626 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:05:11.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:05:11.628 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:05:11.628 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:05:11.628 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:05:11.629 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-25 04:05:11.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 424623784547700729119033158968395978318974344899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 25 02:45:12 UTC 2021 Final Date: Tue Nov 25 02:45:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:5e:2e:b2:dd:af:c6:a0:88:f6:0b:2f:f2:31:1b:ec:31:7a:76:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33551b200a77b5c4e8104c7110a5b4e30ba22907 d6c356737f534a127d257a658e68f3d11763fcb3 6dd1aafdeb413366fd4c98dcc7ab83166df99341 bdeeeb774db5c61ac6fb407e13094f8ebf129c4a aa0bd19d1decfba2dd3cef6f93a07ed8e757145e 790a51408dd59f531ed2a7efdb9014182c4a7b9b 8bd4702c5f1018bbdd464e9f2d482718ce3a77c7 5f2f43d3a7529b279faba949e5d4ac6e09003bb2 0fba41eba2853735db2fc284f1294991aad79e10 07fa0c52f53e78ba573b84565f2cebad56555ed6 6e9e219b1084df42df1a3579abcdff8e419f6ffa 40adae32369a2547b40b85675e2119418cc53bf8 78fbe8750ed699b01fb662a773d4c01d9dff8c27 79e880f4ec0916c61fd49c1b97e95d38ba989f35 86de21306c7cd9fbba7ee847b71905c32bca9c92 b6045f9252fff20780890396aa05636bf9f61c0c c81294286dc64402a286ead200d288fbad433436 a291f8eb41700ed22b9caea4d9b69619fc71c233 8fb798eef9df710d1625782fe515defd4572edec f00ed075 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:0b:a1:66:5a:e5:fa:ab:a4:e4:8e:3c:86:b6:40:a7:1f:6b:6b:be] modulus: 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 public exponent: 10001 ] 2021-11-25 04:05:21.548  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-25 04:05:21.549 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-25 04:05:21.551 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-25 04:05:21.551 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-25 04:05:21.551  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-25 04:05:21.552  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-25 04:05:21.552  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-25 04:05:21.552 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-25 04:05:21.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-25 04:05:21.553 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-25 04:05:21.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-25 04:05:21.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:05:21.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:05:21.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:05:21.698  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-25 04:05:21.718  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-25 04:05:21.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-25 04:05:21.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:05:21.720  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-25 04:05:21.720  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-25 04:05:21.721 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:05:21.721 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:05:21.721 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:05:21.722 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:05:21.722 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:05:21.723 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:05:21.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:05:21.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:05:21.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:05:21.725 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-25 04:05:21.728 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 424623784547700729119033158968395978318974344899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 25 02:45:12 UTC 2021 Final Date: Tue Nov 25 02:45:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:5e:2e:b2:dd:af:c6:a0:88:f6:0b:2f:f2:31:1b:ec:31:7a:76:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33551b200a77b5c4e8104c7110a5b4e30ba22907 d6c356737f534a127d257a658e68f3d11763fcb3 6dd1aafdeb413366fd4c98dcc7ab83166df99341 bdeeeb774db5c61ac6fb407e13094f8ebf129c4a aa0bd19d1decfba2dd3cef6f93a07ed8e757145e 790a51408dd59f531ed2a7efdb9014182c4a7b9b 8bd4702c5f1018bbdd464e9f2d482718ce3a77c7 5f2f43d3a7529b279faba949e5d4ac6e09003bb2 0fba41eba2853735db2fc284f1294991aad79e10 07fa0c52f53e78ba573b84565f2cebad56555ed6 6e9e219b1084df42df1a3579abcdff8e419f6ffa 40adae32369a2547b40b85675e2119418cc53bf8 78fbe8750ed699b01fb662a773d4c01d9dff8c27 79e880f4ec0916c61fd49c1b97e95d38ba989f35 86de21306c7cd9fbba7ee847b71905c32bca9c92 b6045f9252fff20780890396aa05636bf9f61c0c c81294286dc64402a286ead200d288fbad433436 a291f8eb41700ed22b9caea4d9b69619fc71c233 8fb798eef9df710d1625782fe515defd4572edec f00ed075 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:56:8a:82:c7:49:fb:07:01:7e:e9:a4:82:52:40:90:fd:df:ae:8d] modulus: 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 public exponent: 10001 ] 2021-11-25 04:06:58.898  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-25 04:06:58.900 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-25 04:06:58.901 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-25 04:06:58.902 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-25 04:06:58.903  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-25 04:06:58.903  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-25 04:06:58.904  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-25 04:06:58.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-25 04:06:58.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-25 04:06:58.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-25 04:06:58.909 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-25 04:06:58.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:06:58.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-25 04:06:58.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:06:59.050  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-25 04:06:59.051  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-25 04:06:59.051 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-25 04:06:59.052 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-25 04:06:59.053  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-25 04:06:59.054  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-25 04:06:59.054 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:06:59.054 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:06:59.054 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:06:59.055 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:06:59.055 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:06:59.056 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:06:59.057 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-25 04:06:59.057 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-25 04:06:59.057 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-25 04:06:59.058 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-25 04:06:59.119 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 424623784547700729119033158968395978318974344899 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 25 02:45:12 UTC 2021 Final Date: Tue Nov 25 02:45:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4d:5e:2e:b2:dd:af:c6:a0:88:f6:0b:2f:f2:31:1b:ec:31:7a:76:1a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 33551b200a77b5c4e8104c7110a5b4e30ba22907 d6c356737f534a127d257a658e68f3d11763fcb3 6dd1aafdeb413366fd4c98dcc7ab83166df99341 bdeeeb774db5c61ac6fb407e13094f8ebf129c4a aa0bd19d1decfba2dd3cef6f93a07ed8e757145e 790a51408dd59f531ed2a7efdb9014182c4a7b9b 8bd4702c5f1018bbdd464e9f2d482718ce3a77c7 5f2f43d3a7529b279faba949e5d4ac6e09003bb2 0fba41eba2853735db2fc284f1294991aad79e10 07fa0c52f53e78ba573b84565f2cebad56555ed6 6e9e219b1084df42df1a3579abcdff8e419f6ffa 40adae32369a2547b40b85675e2119418cc53bf8 78fbe8750ed699b01fb662a773d4c01d9dff8c27 79e880f4ec0916c61fd49c1b97e95d38ba989f35 86de21306c7cd9fbba7ee847b71905c32bca9c92 b6045f9252fff20780890396aa05636bf9f61c0c c81294286dc64402a286ead200d288fbad433436 a291f8eb41700ed22b9caea4d9b69619fc71c233 8fb798eef9df710d1625782fe515defd4572edec f00ed075 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:4c:de:ac:42:f1:e2:79:da:71:be:34:f2:33:a5:03:75:5a:c2:0f] modulus: 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 public exponent: 10001 ]