2022-03-08 02:32:01,371 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-08 02:32:06,989 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-08 02:32:10.175  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 08, 2022 2:32:20 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 08, 2022 2:32:20 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 08, 2022 2:32:20 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 08, 2022 2:32:21 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-08 02:32:23.383 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-08 02:32:24.787  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-08 02:32:25.590  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-08 02:32:28.992 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-08 02:32:28.994 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-03-08 02:32:28.995 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-08 02:32:29.076 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-08 02:32:29.194 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-08 02:32:29.272 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-03-08 02:32:29.707 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-08 02:32:34.678 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 08, 2022 2:32:38 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-08 02:32:39.872  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 42.399 seconds (JVM running for 50.985) Mar 08, 2022 2:32:44 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-08 02:33:14.874  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-08 02:33:14.884 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-08 02:33:14.989 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-08 02:33:14.992 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 02:33:15.084  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-08 02:33:15.087  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-08 02:33:15.171  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-08 02:33:15.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-08 02:33:15.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 02:33:15.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-08 02:33:15.185 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-08 02:33:15.188 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-08 02:33:15.379 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-08 02:33:15.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 02:33:15.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 02:33:15.474 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 02:33:16.855  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-08 02:33:16.857  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-08 02:33:16.858 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-08 02:33:16.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 02:33:16.866  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-08 02:33:16.867  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-08 02:33:16.868 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 02:33:16.868 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 02:33:16.869 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 02:33:16.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 02:33:16.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 02:33:16.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 02:33:16.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 02:33:16.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 02:33:16.892 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 02:33:16.894 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 02:33:16.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 621252058150077364861698693189981512221720536826 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 02:23:41 UTC 2022 Final Date: Sun Mar 07 02:23:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [52:50:f5:d5:bd:3a:50:05:5b:41:20:2a:00:d8:d9:c0:21:e8:75:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 23bfa160159ca01314021940343c3daed9cde6ad 3e806b522b8976a847444d082876643d727f357b f0269d00eb308bef012c8314fff22158ff6d88a0 37419b959affabb8d2246c6563003ee2ba9a0b6f f45e092db9259ea37829883a6a2af11cbd0ce7d2 63d6271c683471a25bf4feabf722c65e65c682e7 d93d3ecff7d1da34c98f315320c4ab1c930bee05 ee210ab5d8dfb04f14f0764b3ce68da8870fcb86 3c233a0bb2756ec05d877b7f044de7a7ac3c2017 34080bc0de1349eed99b0cd96ad36714c3b7acb9 a07105eaf4a6dd1c1df33cf2c7cb10532a1df494 7ab384c9c1203817d46c44f3654cbff22745261e 95e7092b4cb303f4dc60b9d84ec186cd5243a6a6 8c8fe2c6a3305fe966016fc07074081f3f7764c0 9d477bfaf9acadf565400a08a4747110251c3658 f8720eb2f5295e7ca2a505cfae8714c2e49dcf2a 7f6de301eb17a0456112a2ac69009cdfd62246b8 3d1bb0da14bd1c5bdaa512113eae321fb9e6504a 5a792eebcdd108702d9bcaa802c7bc509c44522f fe8674e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:1e:2f:f8:95:58:ff:56:df:da:bc:2d:57:e8:b5:db:b4:98:2c:af] modulus: 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 public exponent: 10001 ] 2022-03-08 03:53:01.931  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-08 03:53:01.934 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-08 03:53:01.937 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 03:53:01.939 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 03:53:01.972  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-08 03:53:01.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-08 03:53:01.974  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-08 03:53:01.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-08 03:53:01.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-08 03:53:01.977 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-08 03:53:01.986 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-08 03:53:01.987 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 03:53:01.988 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 03:53:01.988 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 03:53:02.160  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-08 03:53:02.160  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-08 03:53:02.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-08 03:53:02.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 03:53:02.173  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-08 03:53:02.173  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-08 03:53:02.174 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:53:02.174 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:53:02.175 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:53:02.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:53:02.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:53:02.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:53:02.177 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:53:02.178 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:53:02.178 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:53:02.179 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 03:53:02.184 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 621252058150077364861698693189981512221720536826 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 02:23:41 UTC 2022 Final Date: Sun Mar 07 02:23:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [52:50:f5:d5:bd:3a:50:05:5b:41:20:2a:00:d8:d9:c0:21:e8:75:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 23bfa160159ca01314021940343c3daed9cde6ad 3e806b522b8976a847444d082876643d727f357b f0269d00eb308bef012c8314fff22158ff6d88a0 37419b959affabb8d2246c6563003ee2ba9a0b6f f45e092db9259ea37829883a6a2af11cbd0ce7d2 63d6271c683471a25bf4feabf722c65e65c682e7 d93d3ecff7d1da34c98f315320c4ab1c930bee05 ee210ab5d8dfb04f14f0764b3ce68da8870fcb86 3c233a0bb2756ec05d877b7f044de7a7ac3c2017 34080bc0de1349eed99b0cd96ad36714c3b7acb9 a07105eaf4a6dd1c1df33cf2c7cb10532a1df494 7ab384c9c1203817d46c44f3654cbff22745261e 95e7092b4cb303f4dc60b9d84ec186cd5243a6a6 8c8fe2c6a3305fe966016fc07074081f3f7764c0 9d477bfaf9acadf565400a08a4747110251c3658 f8720eb2f5295e7ca2a505cfae8714c2e49dcf2a 7f6de301eb17a0456112a2ac69009cdfd62246b8 3d1bb0da14bd1c5bdaa512113eae321fb9e6504a 5a792eebcdd108702d9bcaa802c7bc509c44522f fe8674e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:db:55:1b:3a:fc:5a:dc:40:a6:a4:bb:a2:cd:d1:bd:c2:f9:4e:a7] modulus: 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 public exponent: 10001 ] 2022-03-08 03:57:07.904  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-08 03:57:07.906 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-08 03:57:07.907 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 03:57:07.908 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 03:57:07.909  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 03:57:07.909  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-08 03:57:07.910  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-08 03:57:07.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-08 03:57:07.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-08 03:57:07.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-08 03:57:07.918 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-08 03:57:07.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 03:57:07.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 03:57:07.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 03:57:08.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-08 03:57:08.043  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-08 03:57:08.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-08 03:57:08.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 03:57:08.073  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-08 03:57:08.074  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-08 03:57:08.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:57:08.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:57:08.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:57:08.076 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:57:08.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:57:08.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:57:08.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:57:08.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:57:08.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:57:08.081 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 03:57:08.084 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 621252058150077364861698693189981512221720536826 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 02:23:41 UTC 2022 Final Date: Sun Mar 07 02:23:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [52:50:f5:d5:bd:3a:50:05:5b:41:20:2a:00:d8:d9:c0:21:e8:75:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 23bfa160159ca01314021940343c3daed9cde6ad 3e806b522b8976a847444d082876643d727f357b f0269d00eb308bef012c8314fff22158ff6d88a0 37419b959affabb8d2246c6563003ee2ba9a0b6f f45e092db9259ea37829883a6a2af11cbd0ce7d2 63d6271c683471a25bf4feabf722c65e65c682e7 d93d3ecff7d1da34c98f315320c4ab1c930bee05 ee210ab5d8dfb04f14f0764b3ce68da8870fcb86 3c233a0bb2756ec05d877b7f044de7a7ac3c2017 34080bc0de1349eed99b0cd96ad36714c3b7acb9 a07105eaf4a6dd1c1df33cf2c7cb10532a1df494 7ab384c9c1203817d46c44f3654cbff22745261e 95e7092b4cb303f4dc60b9d84ec186cd5243a6a6 8c8fe2c6a3305fe966016fc07074081f3f7764c0 9d477bfaf9acadf565400a08a4747110251c3658 f8720eb2f5295e7ca2a505cfae8714c2e49dcf2a 7f6de301eb17a0456112a2ac69009cdfd62246b8 3d1bb0da14bd1c5bdaa512113eae321fb9e6504a 5a792eebcdd108702d9bcaa802c7bc509c44522f fe8674e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [06:54:73:c9:80:8d:8b:b6:3d:62:f5:72:9d:5a:97:ff:8c:9e:06:18] modulus: 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 public exponent: 10001 ] 2022-03-08 03:57:39.440  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-08 03:57:39.440 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-08 03:57:39.442 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 03:57:39.442 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 03:57:39.443  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2022-03-08 03:57:39.443  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-08 03:57:39.444  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-08 03:57:39.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-08 03:57:39.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-08 03:57:39.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-08 03:57:39.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-08 03:57:39.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 03:57:39.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 03:57:39.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 03:57:39.542  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-08 03:57:39.543  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-08 03:57:39.543 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-08 03:57:39.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 03:57:39.546  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-08 03:57:39.546  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-08 03:57:39.547 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:57:39.547 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:57:39.547 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:57:39.548 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:57:39.548 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:57:39.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:57:39.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:57:39.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:57:39.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:57:39.570 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 03:57:39.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 621252058150077364861698693189981512221720536826 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 02:23:41 UTC 2022 Final Date: Sun Mar 07 02:23:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [52:50:f5:d5:bd:3a:50:05:5b:41:20:2a:00:d8:d9:c0:21:e8:75:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 23bfa160159ca01314021940343c3daed9cde6ad 3e806b522b8976a847444d082876643d727f357b f0269d00eb308bef012c8314fff22158ff6d88a0 37419b959affabb8d2246c6563003ee2ba9a0b6f f45e092db9259ea37829883a6a2af11cbd0ce7d2 63d6271c683471a25bf4feabf722c65e65c682e7 d93d3ecff7d1da34c98f315320c4ab1c930bee05 ee210ab5d8dfb04f14f0764b3ce68da8870fcb86 3c233a0bb2756ec05d877b7f044de7a7ac3c2017 34080bc0de1349eed99b0cd96ad36714c3b7acb9 a07105eaf4a6dd1c1df33cf2c7cb10532a1df494 7ab384c9c1203817d46c44f3654cbff22745261e 95e7092b4cb303f4dc60b9d84ec186cd5243a6a6 8c8fe2c6a3305fe966016fc07074081f3f7764c0 9d477bfaf9acadf565400a08a4747110251c3658 f8720eb2f5295e7ca2a505cfae8714c2e49dcf2a 7f6de301eb17a0456112a2ac69009cdfd62246b8 3d1bb0da14bd1c5bdaa512113eae321fb9e6504a 5a792eebcdd108702d9bcaa802c7bc509c44522f fe8674e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:41:f5:5f:50:7c:0c:ff:b7:fa:db:a5:e2:53:c5:bc:15:fc:6c:3a] modulus: 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 public exponent: 10001 ] 2022-03-08 03:58:12.561  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-08 03:58:12.562 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-08 03:58:12.563 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 03:58:12.563 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 03:58:12.564  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2022-03-08 03:58:12.564  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-08 03:58:12.564  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-08 03:58:12.564 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-08 03:58:12.565 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-08 03:58:12.565 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-08 03:58:12.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-08 03:58:12.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 03:58:12.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 03:58:12.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 03:58:12.649  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-08 03:58:12.650  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-08 03:58:12.650 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-08 03:58:12.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 03:58:12.671  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-08 03:58:12.672  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-08 03:58:12.672 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:58:12.673 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:58:12.673 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:58:12.674 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:58:12.675 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:58:12.675 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:58:12.676 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 03:58:12.676 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 03:58:12.677 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 03:58:12.678 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 03:58:12.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 621252058150077364861698693189981512221720536826 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 02:23:41 UTC 2022 Final Date: Sun Mar 07 02:23:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [52:50:f5:d5:bd:3a:50:05:5b:41:20:2a:00:d8:d9:c0:21:e8:75:b7] modulus: a568e57a390b790c5267314e407e3bdf52381e7daa9c34ba281f6a351e2e9d4b3ea1521abc11701321a5e162d124e87699c86a8711edda71553856d81d85914ca755ae85b6bdb689c3f5b4a742438001cff281b546ba6372ae00101096e4a5786002c78f576a4503d06ea294af07aa45002f7c21a544afa0e10f6632b16223da4d1bed994eff67cfa9dc496ba1d833f267cecd01fb6d0baded66b2c79cab03169e65e8a64372c4531a1b6e13d80d50a62ee4af30b6e4fd1e43c660c12f26d897e4f4ae9aebd3febe537c7a48a036ae3f7f2f1bcc25d08dcb66b6c4f05979dede36e7b931e044d7e4078bcf56863677179e2ac1b1ccece4dbf1c73a5ebaa9ac0ce5435d7f3023dc1b598eb6a1ee9d90a2e1b4549f9257fa89b3bbb8cb0ee7e22bd199da29aaddd2d68b3a612c7037aac71277eef5edaa6cc8637e8eea54891c6a163e0aba716313f11f2742fe974f9f449b7cd440204af5327c7215b1859161db14e4b5c2ad11c10a21ab646d1e8b082b9b5238cb3dd0ce41ddc1aa1c69776a61 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 23bfa160159ca01314021940343c3daed9cde6ad 3e806b522b8976a847444d082876643d727f357b f0269d00eb308bef012c8314fff22158ff6d88a0 37419b959affabb8d2246c6563003ee2ba9a0b6f f45e092db9259ea37829883a6a2af11cbd0ce7d2 63d6271c683471a25bf4feabf722c65e65c682e7 d93d3ecff7d1da34c98f315320c4ab1c930bee05 ee210ab5d8dfb04f14f0764b3ce68da8870fcb86 3c233a0bb2756ec05d877b7f044de7a7ac3c2017 34080bc0de1349eed99b0cd96ad36714c3b7acb9 a07105eaf4a6dd1c1df33cf2c7cb10532a1df494 7ab384c9c1203817d46c44f3654cbff22745261e 95e7092b4cb303f4dc60b9d84ec186cd5243a6a6 8c8fe2c6a3305fe966016fc07074081f3f7764c0 9d477bfaf9acadf565400a08a4747110251c3658 f8720eb2f5295e7ca2a505cfae8714c2e49dcf2a 7f6de301eb17a0456112a2ac69009cdfd62246b8 3d1bb0da14bd1c5bdaa512113eae321fb9e6504a 5a792eebcdd108702d9bcaa802c7bc509c44522f fe8674e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [41:5a:44:f3:01:03:f8:1d:d6:aa:9c:b2:53:75:68:eb:96:6a:b9:e7] modulus: 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 public exponent: 10001 ] 2022-03-08 04:00:38.459  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-08 04:00:38.460 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-08 04:00:38.462 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 04:00:38.462 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 04:00:38.463  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 04:00:38.463  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-08 04:00:38.464  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-08 04:00:38.464 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-08 04:00:38.465 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-08 04:00:38.465 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-08 04:00:38.470 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-08 04:00:38.470 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 04:00:38.470 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 04:00:38.470 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 04:00:38.547  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-08 04:00:38.548  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-08 04:00:38.548 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-08 04:00:38.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 04:00:38.552  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-08 04:00:38.552  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-08 04:00:38.553 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:00:38.554 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:00:38.554 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:00:38.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:00:38.571 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:00:38.571 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:00:38.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:00:38.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:00:38.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:00:38.573 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 04:00:38.577 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 621252058150077364861698693189981512221720536826 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 02:23:41 UTC 2022 Final Date: Sun Mar 07 02:23:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [52:50:f5:d5:bd:3a:50:05:5b:41:20:2a:00:d8:d9:c0:21:e8:75:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 23bfa160159ca01314021940343c3daed9cde6ad 3e806b522b8976a847444d082876643d727f357b f0269d00eb308bef012c8314fff22158ff6d88a0 37419b959affabb8d2246c6563003ee2ba9a0b6f f45e092db9259ea37829883a6a2af11cbd0ce7d2 63d6271c683471a25bf4feabf722c65e65c682e7 d93d3ecff7d1da34c98f315320c4ab1c930bee05 ee210ab5d8dfb04f14f0764b3ce68da8870fcb86 3c233a0bb2756ec05d877b7f044de7a7ac3c2017 34080bc0de1349eed99b0cd96ad36714c3b7acb9 a07105eaf4a6dd1c1df33cf2c7cb10532a1df494 7ab384c9c1203817d46c44f3654cbff22745261e 95e7092b4cb303f4dc60b9d84ec186cd5243a6a6 8c8fe2c6a3305fe966016fc07074081f3f7764c0 9d477bfaf9acadf565400a08a4747110251c3658 f8720eb2f5295e7ca2a505cfae8714c2e49dcf2a 7f6de301eb17a0456112a2ac69009cdfd62246b8 3d1bb0da14bd1c5bdaa512113eae321fb9e6504a 5a792eebcdd108702d9bcaa802c7bc509c44522f fe8674e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:23:23:15:93:2c:b8:63:34:f9:9b:af:1c:46:ad:4e:96:fe:e2:2b] modulus: 9d4405690c795dc2c49b619fd1c920155fb790a9de2d8fb6a7f8c27ec311c82b748bd6e0ac3be8920d371ea976ae2faed4f3c3362be3e71ff12a1faa4bffbac576757fc70ca20b00d5a73d94aea451d4b2c60b98fd3d8b8017582c6e68d8def98993ded1a42cdbb0844ae8b5ef8205bbbd562d5874fa5e87b76e5bc6c989a9cadc1e7b27927b82cfc2dd1f6c6e260058f7c9008cb2f6cd9b58962994d9e7756655eff18960ad63968250b560b1ba54c4be670ada9757a756335bec20e14cd9177015fac9d9e8cc91ecdca4d9dcb288c7b616d875eb89a7b7e50223a088b94a86b2888f80894738b8ba5325117c2832d8de291a5d036b17b90b483e40439329c1 public exponent: 10001 ] 2022-03-08 04:15:57.003  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-08 04:15:57.005 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-08 04:15:57.007 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 04:15:57.008 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 04:15:57.008  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-03-08 04:15:57.009  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-08 04:15:57.009  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-08 04:15:57.009 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-08 04:15:57.010 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-08 04:15:57.010 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-08 04:15:57.015 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-08 04:15:57.015 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 04:15:57.016 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 04:15:57.016 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 04:15:57.155  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-08 04:15:57.155  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-08 04:15:57.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-08 04:15:57.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 04:15:57.158  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-08 04:15:57.158  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-08 04:15:57.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:15:57.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:15:57.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:15:57.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:15:57.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:15:57.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:15:57.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:15:57.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:15:57.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:15:57.164 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 04:15:57.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 621252058150077364861698693189981512221720536826 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 02:23:41 UTC 2022 Final Date: Sun Mar 07 02:23:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [52:50:f5:d5:bd:3a:50:05:5b:41:20:2a:00:d8:d9:c0:21:e8:75:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 23bfa160159ca01314021940343c3daed9cde6ad 3e806b522b8976a847444d082876643d727f357b f0269d00eb308bef012c8314fff22158ff6d88a0 37419b959affabb8d2246c6563003ee2ba9a0b6f f45e092db9259ea37829883a6a2af11cbd0ce7d2 63d6271c683471a25bf4feabf722c65e65c682e7 d93d3ecff7d1da34c98f315320c4ab1c930bee05 ee210ab5d8dfb04f14f0764b3ce68da8870fcb86 3c233a0bb2756ec05d877b7f044de7a7ac3c2017 34080bc0de1349eed99b0cd96ad36714c3b7acb9 a07105eaf4a6dd1c1df33cf2c7cb10532a1df494 7ab384c9c1203817d46c44f3654cbff22745261e 95e7092b4cb303f4dc60b9d84ec186cd5243a6a6 8c8fe2c6a3305fe966016fc07074081f3f7764c0 9d477bfaf9acadf565400a08a4747110251c3658 f8720eb2f5295e7ca2a505cfae8714c2e49dcf2a 7f6de301eb17a0456112a2ac69009cdfd62246b8 3d1bb0da14bd1c5bdaa512113eae321fb9e6504a 5a792eebcdd108702d9bcaa802c7bc509c44522f fe8674e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:27:fe:e6:4d:f5:b5:89:4c:94:18:dd:2f:d4:90:a7:3e:4f:92:31] modulus: a1c194d3ab4186fff2d7f33fad497bfa1bbaa266b87448b6d1c676a6baf0de2cd63b14f6ff07f1121a0586b1048e8ef86b0486eac57e8c26111da30ba8c6a88aaeb9d50ef4f7bd580a445d0e86387c237c3fee632690d76af4ed14b2f64c59210c4b935dec5cbd3b2e155a552eaa72041a36fa68d3d7ae1e4ec26af236f487b5dde6e7d226a232c30c4c24d3f335769373cb4a9ddca272a3f99904443ef5bcef41736847e580d095142db1f4206a02a1f590b4140a36e602702ed15d9312c6b302cfc76ef8f5c88f62b889a036d7fa2a45d5b0fc42ed8ff3a831b59caf6d0c7e56fdc0c1583b2a41a5376696d1d9576fecc18a82e856add195d49a1efd0476cd public exponent: 10001 ] 2022-03-08 04:17:09.120  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-08 04:17:09.121 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-08 04:17:09.122 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 04:17:09.122 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 04:17:09.123  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-08 04:17:09.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-08 04:17:09.124  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-08 04:17:09.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-08 04:17:09.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-08 04:17:09.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-08 04:17:09.130 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-08 04:17:09.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 04:17:09.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 04:17:09.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 04:17:09.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-08 04:17:09.242  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-08 04:17:09.242 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-08 04:17:09.242 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 04:17:09.244  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-08 04:17:09.244  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-08 04:17:09.245 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:17:09.245 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:17:09.245 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:17:09.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:17:09.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:17:09.247 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:17:09.247 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:17:09.248 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:17:09.248 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:17:09.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 04:17:09.252 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 621252058150077364861698693189981512221720536826 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 02:23:41 UTC 2022 Final Date: Sun Mar 07 02:23:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [52:50:f5:d5:bd:3a:50:05:5b:41:20:2a:00:d8:d9:c0:21:e8:75:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 23bfa160159ca01314021940343c3daed9cde6ad 3e806b522b8976a847444d082876643d727f357b f0269d00eb308bef012c8314fff22158ff6d88a0 37419b959affabb8d2246c6563003ee2ba9a0b6f f45e092db9259ea37829883a6a2af11cbd0ce7d2 63d6271c683471a25bf4feabf722c65e65c682e7 d93d3ecff7d1da34c98f315320c4ab1c930bee05 ee210ab5d8dfb04f14f0764b3ce68da8870fcb86 3c233a0bb2756ec05d877b7f044de7a7ac3c2017 34080bc0de1349eed99b0cd96ad36714c3b7acb9 a07105eaf4a6dd1c1df33cf2c7cb10532a1df494 7ab384c9c1203817d46c44f3654cbff22745261e 95e7092b4cb303f4dc60b9d84ec186cd5243a6a6 8c8fe2c6a3305fe966016fc07074081f3f7764c0 9d477bfaf9acadf565400a08a4747110251c3658 f8720eb2f5295e7ca2a505cfae8714c2e49dcf2a 7f6de301eb17a0456112a2ac69009cdfd62246b8 3d1bb0da14bd1c5bdaa512113eae321fb9e6504a 5a792eebcdd108702d9bcaa802c7bc509c44522f fe8674e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:59:59:1f:1c:fc:c9:82:de:d6:ed:74:2c:c2:14:bf:37:b1:b5:a8] modulus: 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 public exponent: 10001 ] 2022-03-08 04:18:42.925  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-08 04:18:42.926 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-08 04:18:42.927 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-08 04:18:42.928 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-08 04:18:42.928  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2022-03-08 04:18:42.929  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-08 04:18:42.929  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-08 04:18:42.929 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-08 04:18:42.929 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-08 04:18:42.930 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-08 04:18:42.936 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-08 04:18:42.936 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 04:18:42.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-08 04:18:42.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 04:18:43.005  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-08 04:18:43.005  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-08 04:18:43.006 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-08 04:18:43.006 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-08 04:18:43.008  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-08 04:18:43.008  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-08 04:18:43.008 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:18:43.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:18:43.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:18:43.010 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:18:43.010 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:18:43.010 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:18:43.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-08 04:18:43.011 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-08 04:18:43.012 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-08 04:18:43.013 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-08 04:18:43.071 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 621252058150077364861698693189981512221720536826 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 08 02:23:41 UTC 2022 Final Date: Sun Mar 07 02:23:40 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [52:50:f5:d5:bd:3a:50:05:5b:41:20:2a:00:d8:d9:c0:21:e8:75:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 23bfa160159ca01314021940343c3daed9cde6ad 3e806b522b8976a847444d082876643d727f357b f0269d00eb308bef012c8314fff22158ff6d88a0 37419b959affabb8d2246c6563003ee2ba9a0b6f f45e092db9259ea37829883a6a2af11cbd0ce7d2 63d6271c683471a25bf4feabf722c65e65c682e7 d93d3ecff7d1da34c98f315320c4ab1c930bee05 ee210ab5d8dfb04f14f0764b3ce68da8870fcb86 3c233a0bb2756ec05d877b7f044de7a7ac3c2017 34080bc0de1349eed99b0cd96ad36714c3b7acb9 a07105eaf4a6dd1c1df33cf2c7cb10532a1df494 7ab384c9c1203817d46c44f3654cbff22745261e 95e7092b4cb303f4dc60b9d84ec186cd5243a6a6 8c8fe2c6a3305fe966016fc07074081f3f7764c0 9d477bfaf9acadf565400a08a4747110251c3658 f8720eb2f5295e7ca2a505cfae8714c2e49dcf2a 7f6de301eb17a0456112a2ac69009cdfd62246b8 3d1bb0da14bd1c5bdaa512113eae321fb9e6504a 5a792eebcdd108702d9bcaa802c7bc509c44522f fe8674e7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:a1:ac:10:64:5f:02:57:0c:3d:cb:d3:a5:57:4b:90:d3:90:53:8a] modulus: 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 public exponent: 10001 ]