2021-12-02 02:32:44,271 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-12-02 02:32:48,058 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-12-02 02:32:50.360  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-12-02 02:33:01.968 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-12-02 02:33:03.263  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-12-02 02:33:03.877  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-12-02 02:33:13.776  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 31.298 seconds (JVM running for 37.6) 2021-12-02 02:34:03.269  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 02:34:03.358 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 02:34:03.393 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-12-02 02:34:03.457 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 02:34:03.562  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-12-02 02:34:03.565  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 02:34:03.566  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 02:34:03.568 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 02:34:03.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:34:03.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 02:34:03.656 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 02:34:03.659 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 02:34:03.769 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 02:34:03.773 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:34:03.774 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:34:03.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:34:05.072  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 02:34:05.075  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 02:34:05.076 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 02:34:05.078 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:34:05.086  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 02:34:05.086  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 02:34:05.087 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:34:05.088 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:34:05.088 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:34:05.164 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:34:05.164 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:34:05.165 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:34:05.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:34:05.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:34:05.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:34:05.172 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 02:34:05.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 418425782942725116767796671185191751667038498737 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 02:27:14 UTC 2021 Final Date: Tue Dec 02 02:27:13 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:e3:8e:b0:21:17:2e:2c:a3:76:34:b1:30:2c:00:86:b6:92:51:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 99b976a5789ed38f03245485b66dab0ce3ca2c46 1da94e192f04e4eb90805f02822dac359a489ed6 9fc0989de792d9f4d7bf5261016e396dc972f5df acf39081fd430c945560df77ac4b410072ee4bc6 af798fac582ba9a6155b6c3c297b2f2299c89bbd 0825861cbb1e6ce9af4262d6bd955bd4e5bdeca4 d3eacdd8792b75c58130b3e8ea448f6a5b5b61b6 6772454c41208ed2ffc375f1fe683f63f9d14541 f958ad0cf82869435f98b01ca92f0e78ac0a60a8 253141fa082acded87ac74d7f9511f45437ef874 ea52bc831ff69e44e8dffd6bb72b2e6373d9fc90 58ac4546bb69c11c936088129a49a0749621237b a83d4e61a91080bfb7fac815605619fe76564d17 c890649229eab97d2a893bad1895a49a629385dc 524d6c2946f0c235e0a742b761d48336bba90bc5 f4bc4cb495800e89d58e6bbb654daa0b31a29b0d 70ac637d3e20b52b79af2e7c825249b090919524 ecab6dd5e9c719c15b86efaa126d654214cd4fd8 1c442bc31d845038a2164f7f24d9160c739d3dcd 6380aa4c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:27:79:a6:02:fc:7a:6e:97:c5:1f:4d:85:b7:43:ea:51:c1:a6:fc] modulus: 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 public exponent: 10001 ] 2021-12-02 04:18:36.190  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 04:18:36.255 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 04:18:36.257 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-12-02 04:18:36.261 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 04:18:36.263  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-12-02 04:18:36.264  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 04:18:36.265  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 04:18:36.265 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 04:18:36.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 04:18:36.268 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 04:18:36.277 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 04:18:36.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 04:18:36.278 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 04:18:36.279 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 04:18:36.460  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 04:18:36.460  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 04:18:36.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 04:18:36.461 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 04:18:36.464  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 04:18:36.464  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 04:18:36.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:18:36.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:18:36.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:18:36.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:18:36.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:18:36.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:18:36.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:18:36.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:18:36.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:18:36.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 04:18:36.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 418425782942725116767796671185191751667038498737 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 02:27:14 UTC 2021 Final Date: Tue Dec 02 02:27:13 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:e3:8e:b0:21:17:2e:2c:a3:76:34:b1:30:2c:00:86:b6:92:51:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 99b976a5789ed38f03245485b66dab0ce3ca2c46 1da94e192f04e4eb90805f02822dac359a489ed6 9fc0989de792d9f4d7bf5261016e396dc972f5df acf39081fd430c945560df77ac4b410072ee4bc6 af798fac582ba9a6155b6c3c297b2f2299c89bbd 0825861cbb1e6ce9af4262d6bd955bd4e5bdeca4 d3eacdd8792b75c58130b3e8ea448f6a5b5b61b6 6772454c41208ed2ffc375f1fe683f63f9d14541 f958ad0cf82869435f98b01ca92f0e78ac0a60a8 253141fa082acded87ac74d7f9511f45437ef874 ea52bc831ff69e44e8dffd6bb72b2e6373d9fc90 58ac4546bb69c11c936088129a49a0749621237b a83d4e61a91080bfb7fac815605619fe76564d17 c890649229eab97d2a893bad1895a49a629385dc 524d6c2946f0c235e0a742b761d48336bba90bc5 f4bc4cb495800e89d58e6bbb654daa0b31a29b0d 70ac637d3e20b52b79af2e7c825249b090919524 ecab6dd5e9c719c15b86efaa126d654214cd4fd8 1c442bc31d845038a2164f7f24d9160c739d3dcd 6380aa4c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:df:75:5a:8e:32:dd:75:78:4e:0f:0d:aa:e5:5f:15:c5:96:5a:23] modulus: b406a44ae85445990ce13844da69fa58bbe2169dc3ee9bce530309b531d9bd418ee47dfc720d6b75cd9274437cdc15e3dce52ec7f5bc044ffc4931ab189a0a49d65c3331b5cdd051ef14adf456d8207e209c571f93dc60f245511e986054d2543d6bf9c3cbaa9d02fa1ea0c0b68dd1b1abd9948f892f74770d03196a6f22bbdd9ad484f3e67ba1fbfc1b77aec684a64e535dc81b4ef1e9980e963092291b2c3704efa4f1d9ad8e146510d7e6cad480d05d66b32a9a76d28618bcb8f3ac72ae70e1c644b2f8a3c43f188644f0b42687f4c62ccaf3482e6cd2c39d2ec0b375ac6850f8734b5e7368916e15884811cd94efe4fdcd01d208fc093d63fef884b315a1 public exponent: 10001 ] 2021-12-02 04:23:06.612  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 04:23:06.612 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 04:23:06.614 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-12-02 04:23:06.615 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 04:23:06.615  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-12-02 04:23:06.616  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 04:23:06.617  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 04:23:06.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 04:23:06.618 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 04:23:06.618 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 04:23:06.655 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 04:23:06.656 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 04:23:06.656 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 04:23:06.656 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 04:23:06.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 04:23:06.755  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 04:23:06.755 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 04:23:06.755 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 04:23:06.757  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 04:23:06.757  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 04:23:06.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:23:06.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:23:06.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:23:06.759 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:23:06.759 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:23:06.760 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:23:06.760 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:23:06.761 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:23:06.761 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:23:06.762 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 04:23:06.765 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 418425782942725116767796671185191751667038498737 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 02:27:14 UTC 2021 Final Date: Tue Dec 02 02:27:13 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:e3:8e:b0:21:17:2e:2c:a3:76:34:b1:30:2c:00:86:b6:92:51:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 99b976a5789ed38f03245485b66dab0ce3ca2c46 1da94e192f04e4eb90805f02822dac359a489ed6 9fc0989de792d9f4d7bf5261016e396dc972f5df acf39081fd430c945560df77ac4b410072ee4bc6 af798fac582ba9a6155b6c3c297b2f2299c89bbd 0825861cbb1e6ce9af4262d6bd955bd4e5bdeca4 d3eacdd8792b75c58130b3e8ea448f6a5b5b61b6 6772454c41208ed2ffc375f1fe683f63f9d14541 f958ad0cf82869435f98b01ca92f0e78ac0a60a8 253141fa082acded87ac74d7f9511f45437ef874 ea52bc831ff69e44e8dffd6bb72b2e6373d9fc90 58ac4546bb69c11c936088129a49a0749621237b a83d4e61a91080bfb7fac815605619fe76564d17 c890649229eab97d2a893bad1895a49a629385dc 524d6c2946f0c235e0a742b761d48336bba90bc5 f4bc4cb495800e89d58e6bbb654daa0b31a29b0d 70ac637d3e20b52b79af2e7c825249b090919524 ecab6dd5e9c719c15b86efaa126d654214cd4fd8 1c442bc31d845038a2164f7f24d9160c739d3dcd 6380aa4c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:9f:c2:d3:02:d2:ff:cd:53:6b:41:9a:bc:3b:13:60:fb:f2:51:4a] modulus: c22474800fd977f3e41378520e547e923d8cf3aa79e4de82fc54bf96e55e61341f1882ae943704f2de7ddad1e80315fe1c114b582c9662bcd49f2fa8e3d0065504a0f86dcd977c1e64966d487d3c984218bf7ac8a2d56283387301b088a43a90adf75703358f4e6cdd3c4650e7b04e9ea9fb6ca634f25c548a96f565393a5b018f4026081074b7907e88c4047426a1899c3485a5455a400d9f5e8f51e0922a0ea893418222aaf7eaf7bc08d93f800eeff6d1cfe4eb2aec9f5165205cad23a228ac6de96251c8487a662bcbd0c51cbf630a0d3898b6a6138c44d16bf6921db3ab471edffec58fc8a4096b300a16304dc300c565a0e04ee3b23f31792f2525d451 public exponent: 10001 ] 2021-12-02 04:23:38.128  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 04:23:38.129 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 04:23:38.130 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-12-02 04:23:38.131 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 04:23:38.131  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-12-02 04:23:38.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 04:23:38.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 04:23:38.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 04:23:38.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 04:23:38.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 04:23:38.138 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 04:23:38.139 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 04:23:38.139 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 04:23:38.139 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 04:23:38.239  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 04:23:38.240  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 04:23:38.240 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 04:23:38.240 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 04:23:38.241  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 04:23:38.242  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 04:23:38.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:23:38.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:23:38.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:23:38.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:23:38.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:23:38.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:23:38.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:23:38.259 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:23:38.259 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:23:38.260 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 04:23:38.264 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 418425782942725116767796671185191751667038498737 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 02:27:14 UTC 2021 Final Date: Tue Dec 02 02:27:13 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:e3:8e:b0:21:17:2e:2c:a3:76:34:b1:30:2c:00:86:b6:92:51:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 99b976a5789ed38f03245485b66dab0ce3ca2c46 1da94e192f04e4eb90805f02822dac359a489ed6 9fc0989de792d9f4d7bf5261016e396dc972f5df acf39081fd430c945560df77ac4b410072ee4bc6 af798fac582ba9a6155b6c3c297b2f2299c89bbd 0825861cbb1e6ce9af4262d6bd955bd4e5bdeca4 d3eacdd8792b75c58130b3e8ea448f6a5b5b61b6 6772454c41208ed2ffc375f1fe683f63f9d14541 f958ad0cf82869435f98b01ca92f0e78ac0a60a8 253141fa082acded87ac74d7f9511f45437ef874 ea52bc831ff69e44e8dffd6bb72b2e6373d9fc90 58ac4546bb69c11c936088129a49a0749621237b a83d4e61a91080bfb7fac815605619fe76564d17 c890649229eab97d2a893bad1895a49a629385dc 524d6c2946f0c235e0a742b761d48336bba90bc5 f4bc4cb495800e89d58e6bbb654daa0b31a29b0d 70ac637d3e20b52b79af2e7c825249b090919524 ecab6dd5e9c719c15b86efaa126d654214cd4fd8 1c442bc31d845038a2164f7f24d9160c739d3dcd 6380aa4c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:f3:7f:3d:a1:f1:ff:62:aa:43:74:b4:d6:5f:44:b3:a7:fb:b3:79] modulus: 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 public exponent: 10001 ] 2021-12-02 04:24:11.467  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 04:24:11.468 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 04:24:11.469 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-12-02 04:24:11.470 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 04:24:11.470  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-12-02 04:24:11.471  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 04:24:11.471  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 04:24:11.471 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 04:24:11.472 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 04:24:11.472 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 04:24:11.476 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 04:24:11.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 04:24:11.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 04:24:11.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 04:24:11.572  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 04:24:11.573  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 04:24:11.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 04:24:11.573 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 04:24:11.575  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 04:24:11.575  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 04:24:11.575 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:24:11.576 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:24:11.576 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:24:11.576 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:24:11.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:24:11.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:24:11.577 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:24:11.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:24:11.578 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:24:11.579 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 04:24:11.582 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 418425782942725116767796671185191751667038498737 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 02:27:14 UTC 2021 Final Date: Tue Dec 02 02:27:13 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:e3:8e:b0:21:17:2e:2c:a3:76:34:b1:30:2c:00:86:b6:92:51:78] modulus: aaaee7c9e1dfe5b9849f8943a1ec0daa6ed1c9c53bf0cd2248095043a454e349b3b6ac2291fba245af298dfaa931bf29a8a820343a47a9c69dccffd2cceceae19316e7be47462fa9943eab70647500d7adea73ec4e4647a8f338ec6dfd370d3ce1fba6ef98dd902227019d4706f9de0f719ce1673f5a81acbbfe61eee1e3bab95cb9597ee39ab175f8c12e5b0174cc2cfa6c1b0ee709995d644766eb92d40b3eed4a8af5784a9b833a22898dcc4741b225cf674b1c3b5203892ad8b2aed3d0d94f8785a8b2651e7032af369f095e928bc19ff3592137b01d0586f5ae701db70a125ebbcde1cf3eeceeebdcc27cb86754efdb162edbb2803b9c19f57828c318293e3cf8b47f65c4173d70e289e64fb8f26708fa162c3622da8e4467e33782eb0abe270e381a59de5a42f5003c73d4623e90de7a7fafef7de1ad0e36170bac57664c68f2410eafa7721307a26be620d2f6269aa0b93dab82f346b064c2c86b2376ff270bbe6ded6e322773ececbf0de1163f64c9e24a4389866d6b1341ad99b60d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 99b976a5789ed38f03245485b66dab0ce3ca2c46 1da94e192f04e4eb90805f02822dac359a489ed6 9fc0989de792d9f4d7bf5261016e396dc972f5df acf39081fd430c945560df77ac4b410072ee4bc6 af798fac582ba9a6155b6c3c297b2f2299c89bbd 0825861cbb1e6ce9af4262d6bd955bd4e5bdeca4 d3eacdd8792b75c58130b3e8ea448f6a5b5b61b6 6772454c41208ed2ffc375f1fe683f63f9d14541 f958ad0cf82869435f98b01ca92f0e78ac0a60a8 253141fa082acded87ac74d7f9511f45437ef874 ea52bc831ff69e44e8dffd6bb72b2e6373d9fc90 58ac4546bb69c11c936088129a49a0749621237b a83d4e61a91080bfb7fac815605619fe76564d17 c890649229eab97d2a893bad1895a49a629385dc 524d6c2946f0c235e0a742b761d48336bba90bc5 f4bc4cb495800e89d58e6bbb654daa0b31a29b0d 70ac637d3e20b52b79af2e7c825249b090919524 ecab6dd5e9c719c15b86efaa126d654214cd4fd8 1c442bc31d845038a2164f7f24d9160c739d3dcd 6380aa4c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:0d:d9:6b:63:d2:d2:a3:86:55:68:4b:ac:7d:36:ae:6a:32:20:23] modulus: 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 public exponent: 10001 ] 2021-12-02 04:26:36.676  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 04:26:36.677 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 04:26:36.679 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-12-02 04:26:36.680 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 04:26:36.680  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-12-02 04:26:36.681  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 04:26:36.681  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 04:26:36.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 04:26:36.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 04:26:36.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 04:26:36.755 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 04:26:36.756 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 04:26:36.756 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 04:26:36.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 04:26:36.841  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 04:26:36.842  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 04:26:36.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 04:26:36.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 04:26:36.856  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 04:26:36.856  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 04:26:36.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:26:36.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:26:36.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:26:36.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:26:36.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:26:36.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:26:36.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 04:26:36.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 04:26:36.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 04:26:36.860 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 04:26:36.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 418425782942725116767796671185191751667038498737 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 02:27:14 UTC 2021 Final Date: Tue Dec 02 02:27:13 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:e3:8e:b0:21:17:2e:2c:a3:76:34:b1:30:2c:00:86:b6:92:51:78] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 99b976a5789ed38f03245485b66dab0ce3ca2c46 1da94e192f04e4eb90805f02822dac359a489ed6 9fc0989de792d9f4d7bf5261016e396dc972f5df acf39081fd430c945560df77ac4b410072ee4bc6 af798fac582ba9a6155b6c3c297b2f2299c89bbd 0825861cbb1e6ce9af4262d6bd955bd4e5bdeca4 d3eacdd8792b75c58130b3e8ea448f6a5b5b61b6 6772454c41208ed2ffc375f1fe683f63f9d14541 f958ad0cf82869435f98b01ca92f0e78ac0a60a8 253141fa082acded87ac74d7f9511f45437ef874 ea52bc831ff69e44e8dffd6bb72b2e6373d9fc90 58ac4546bb69c11c936088129a49a0749621237b a83d4e61a91080bfb7fac815605619fe76564d17 c890649229eab97d2a893bad1895a49a629385dc 524d6c2946f0c235e0a742b761d48336bba90bc5 f4bc4cb495800e89d58e6bbb654daa0b31a29b0d 70ac637d3e20b52b79af2e7c825249b090919524 ecab6dd5e9c719c15b86efaa126d654214cd4fd8 1c442bc31d845038a2164f7f24d9160c739d3dcd 6380aa4c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [89:de:56:f5:d2:87:2f:87:44:a1:e8:5d:d2:91:c9:0e:bf:ca:92:d9] modulus: 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 public exponent: 10001 ]