2021-09-15 00:54:45,114 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-15 00:54:49,724 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-15 00:54:53.131  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-09-15 00:55:08.917 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-15 00:55:10.622  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-09-15 00:55:11.323  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-15 00:55:24.128  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 41.608 seconds (JVM running for 49.746) 2021-09-15 00:59:53.115  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-15 00:59:53.128 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-15 00:59:53.327 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-15 00:59:53.331 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-15 00:59:53.424  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-15 00:59:53.427  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-15 00:59:53.428  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-15 00:59:53.430 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-15 00:59:53.430 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 00:59:53.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-15 00:59:53.521 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-15 00:59:53.527 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-15 00:59:53.819 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-15 00:59:53.826 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 00:59:53.827 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 00:59:53.832 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 00:59:55.354  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-15 00:59:55.358  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-15 00:59:55.358 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-15 00:59:55.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 00:59:55.418  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-15 00:59:55.420  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-15 00:59:55.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 00:59:55.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 00:59:55.423 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 00:59:55.525 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 00:59:55.525 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 00:59:55.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 00:59:55.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 00:59:55.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 00:59:55.531 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 00:59:55.534 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-15 00:59:55.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527685773391511481285783033470674480842075434758 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 15 00:47:12 UTC 2021 Final Date: Mon Sep 15 00:47:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:67:d3:60:9d:db:64:2a:5c:f2:16:85:6d:59:a2:44:e6:26:5c:16] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 88535ee0daf61aa1aae47d097f14f3cdd49beb58 4218eff3a5dea27f88811de20fcfa746c339b4df 667188a6dbc6d3b03ec1fe2337a42e9cfe4f740f fdbd2c36ad1b10e28e47a6a74e29ebc916671e06 fd8d574d3b3f470bfb2722387dd08161b882c4e9 5c55299a3789c44eaf7ac77fb83d239423c43f96 e545d782b5f572ba7f34218b5cbd080fc349a6aa a69f0731925f6f47564d5b958993ffc6c8ebbe79 8bcf92768da4e6bbce1faf7c7cf3693488b78bf6 2dd2533ae210bcf0945f58a77fce4f6c8cd194e4 5486918d5c77f182d93a404d3ce7671fd7721b2c f89d38f9b364f4bcba14e6f4ab02f0155fde8e56 371dc4febe45c0f1352a6deccf3a6469bf713781 9485b729d41110aa7e51118140aed65ba309140c c32bdbfbc507b2bd415b52efc8fecba8d998e2cf b4d3d512d8cfee0eb063332f5f580304bdc7d9c9 0bd86e189165fb300836beed63f55c6858b6f78e 1a43c3aa268e9acd31ac303cb451e4cd52df757e d95a6d006f670c270682115594e82933f3c3d43d e0e78c5c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:ba:3c:f1:bd:7b:4d:f3:33:57:25:ea:14:82:9b:88:4e:de:27:69] modulus: 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 public exponent: 10001 ] 2021-09-15 04:10:43.647  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-15 04:10:43.649 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-15 04:10:43.651 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-15 04:10:43.653 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-15 04:10:43.653  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-15 04:10:43.654  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-15 04:10:43.654  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-15 04:10:43.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-15 04:10:43.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-15 04:10:43.655 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-15 04:10:43.661 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-15 04:10:43.662 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:10:43.662 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:10:43.662 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:10:43.902  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-15 04:10:43.913  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-15 04:10:43.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-15 04:10:43.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:10:43.919  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-15 04:10:43.920  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-15 04:10:43.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:10:43.920 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:10:43.921 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:10:43.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:10:43.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:10:43.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:10:43.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:10:43.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:10:43.924 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:10:43.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-15 04:10:44.016 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527685773391511481285783033470674480842075434758 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 15 00:47:12 UTC 2021 Final Date: Mon Sep 15 00:47:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:67:d3:60:9d:db:64:2a:5c:f2:16:85:6d:59:a2:44:e6:26:5c:16] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 88535ee0daf61aa1aae47d097f14f3cdd49beb58 4218eff3a5dea27f88811de20fcfa746c339b4df 667188a6dbc6d3b03ec1fe2337a42e9cfe4f740f fdbd2c36ad1b10e28e47a6a74e29ebc916671e06 fd8d574d3b3f470bfb2722387dd08161b882c4e9 5c55299a3789c44eaf7ac77fb83d239423c43f96 e545d782b5f572ba7f34218b5cbd080fc349a6aa a69f0731925f6f47564d5b958993ffc6c8ebbe79 8bcf92768da4e6bbce1faf7c7cf3693488b78bf6 2dd2533ae210bcf0945f58a77fce4f6c8cd194e4 5486918d5c77f182d93a404d3ce7671fd7721b2c f89d38f9b364f4bcba14e6f4ab02f0155fde8e56 371dc4febe45c0f1352a6deccf3a6469bf713781 9485b729d41110aa7e51118140aed65ba309140c c32bdbfbc507b2bd415b52efc8fecba8d998e2cf b4d3d512d8cfee0eb063332f5f580304bdc7d9c9 0bd86e189165fb300836beed63f55c6858b6f78e 1a43c3aa268e9acd31ac303cb451e4cd52df757e d95a6d006f670c270682115594e82933f3c3d43d e0e78c5c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [09:9f:89:fa:b7:f7:6d:62:f1:7e:10:25:64:6d:ea:99:f4:ee:a8:aa] modulus: e71fb0463a99d5aa1bec5300ff7ba0a90eee2a0644b53d1570dc40c831421b4dee4c7868a83088349798471a7bb2941f9609a30ee508b3006080877d2620269121abf3f0af384d6390ddcb7536fe0fb18a95fa2822edfd5c94cd3087fa5442e8d428e12ed49824a1e78b281c5091a9518c39e428817e26a8a2ff7d2ee058d0ac6582c04d961419c14fec720423c0c40fadcdab5529811d8c41c12e3a0dc625c5d90362dd3f490df0db0fa29b9c7f1342c378d9047372caf71e0102f37c8b48af2b783ff69ea26fcbfcaf47d326d13e79139c9ce30a0ac4266c928686fb4e297bc78df1f20d9a958758c71598f6b87f551743775e149c8a62d8b66ec220afbe81 public exponent: 10001 ] 2021-09-15 04:12:45.494  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-15 04:12:45.496 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-15 04:12:45.498 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-15 04:12:45.499 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-15 04:12:45.502  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-15 04:12:45.503  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-15 04:12:45.504  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-15 04:12:45.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-15 04:12:45.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-15 04:12:45.512 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-15 04:12:45.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-15 04:12:45.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:12:45.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:12:45.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:12:45.708  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-15 04:12:45.709  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-15 04:12:45.710 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-15 04:12:45.712 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:12:45.715  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-15 04:12:45.716  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-15 04:12:45.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:12:45.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:12:45.718 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:12:45.719 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:12:45.720 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:12:45.720 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:12:45.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:12:45.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:12:45.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:12:45.724 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-15 04:12:45.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527685773391511481285783033470674480842075434758 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 15 00:47:12 UTC 2021 Final Date: Mon Sep 15 00:47:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:67:d3:60:9d:db:64:2a:5c:f2:16:85:6d:59:a2:44:e6:26:5c:16] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 88535ee0daf61aa1aae47d097f14f3cdd49beb58 4218eff3a5dea27f88811de20fcfa746c339b4df 667188a6dbc6d3b03ec1fe2337a42e9cfe4f740f fdbd2c36ad1b10e28e47a6a74e29ebc916671e06 fd8d574d3b3f470bfb2722387dd08161b882c4e9 5c55299a3789c44eaf7ac77fb83d239423c43f96 e545d782b5f572ba7f34218b5cbd080fc349a6aa a69f0731925f6f47564d5b958993ffc6c8ebbe79 8bcf92768da4e6bbce1faf7c7cf3693488b78bf6 2dd2533ae210bcf0945f58a77fce4f6c8cd194e4 5486918d5c77f182d93a404d3ce7671fd7721b2c f89d38f9b364f4bcba14e6f4ab02f0155fde8e56 371dc4febe45c0f1352a6deccf3a6469bf713781 9485b729d41110aa7e51118140aed65ba309140c c32bdbfbc507b2bd415b52efc8fecba8d998e2cf b4d3d512d8cfee0eb063332f5f580304bdc7d9c9 0bd86e189165fb300836beed63f55c6858b6f78e 1a43c3aa268e9acd31ac303cb451e4cd52df757e d95a6d006f670c270682115594e82933f3c3d43d e0e78c5c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:6e:ed:c3:af:45:66:f3:ff:2d:51:62:59:7b:bb:f3:d0:cd:0b:f3] modulus: b70bc72540c2edd3bd8527f78e8210671f9f86208bb4399eca00092c8bfcd13d5f77ba4d1b0c4dbbcf33105af0a09888a268f233eedd996f1186d4e617efae5f59dc487c57d61f459d988d695a5b312b3dc0cbcca5bdd1b4e7ec4f1bb69469aaa823301d7415a1896d52d8d28987b97afe6ce0784003cae6f71e29dbb553c8ed417dd38e759aef352a398fcd230f0cc5e3ba9c5cd2bf37003fd9aaf4b5832b42f6822660a53cb5e865f68c50d9f961af5086763cd6e089bd4c1e555949af2e238b5bb2ddb44b79ef1ece5c9bf0cddb1b660c1551dc9640a41b4d8fe503c38f292737376bbf116443ecd4bff7793b9efad03740e6b71f816227f108af97f3d5df public exponent: 10001 ] 2021-09-15 04:15:18.967  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-15 04:15:18.968 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-15 04:15:18.970 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-15 04:15:18.971 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-15 04:15:18.971  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-15 04:15:18.972  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-15 04:15:18.972  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-15 04:15:18.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-15 04:15:18.973 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-15 04:15:18.974 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-15 04:15:19.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-15 04:15:19.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:15:19.016 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:15:19.016 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:15:19.121  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-15 04:15:19.122  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-15 04:15:19.123 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-15 04:15:19.123 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:15:19.126  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-15 04:15:19.127  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-15 04:15:19.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:15:19.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:15:19.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:15:19.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:15:19.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:15:19.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:15:19.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:15:19.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:15:19.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:15:19.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-15 04:15:19.136 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527685773391511481285783033470674480842075434758 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 15 00:47:12 UTC 2021 Final Date: Mon Sep 15 00:47:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:67:d3:60:9d:db:64:2a:5c:f2:16:85:6d:59:a2:44:e6:26:5c:16] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 88535ee0daf61aa1aae47d097f14f3cdd49beb58 4218eff3a5dea27f88811de20fcfa746c339b4df 667188a6dbc6d3b03ec1fe2337a42e9cfe4f740f fdbd2c36ad1b10e28e47a6a74e29ebc916671e06 fd8d574d3b3f470bfb2722387dd08161b882c4e9 5c55299a3789c44eaf7ac77fb83d239423c43f96 e545d782b5f572ba7f34218b5cbd080fc349a6aa a69f0731925f6f47564d5b958993ffc6c8ebbe79 8bcf92768da4e6bbce1faf7c7cf3693488b78bf6 2dd2533ae210bcf0945f58a77fce4f6c8cd194e4 5486918d5c77f182d93a404d3ce7671fd7721b2c f89d38f9b364f4bcba14e6f4ab02f0155fde8e56 371dc4febe45c0f1352a6deccf3a6469bf713781 9485b729d41110aa7e51118140aed65ba309140c c32bdbfbc507b2bd415b52efc8fecba8d998e2cf b4d3d512d8cfee0eb063332f5f580304bdc7d9c9 0bd86e189165fb300836beed63f55c6858b6f78e 1a43c3aa268e9acd31ac303cb451e4cd52df757e d95a6d006f670c270682115594e82933f3c3d43d e0e78c5c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:b3:0f:1e:47:a4:73:c8:e9:a2:90:96:f9:95:9a:a1:c8:a4:d0:14] modulus: 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 public exponent: 10001 ] 2021-09-15 04:18:00.098  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-15 04:18:00.099 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-15 04:18:00.101 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-15 04:18:00.101 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-15 04:18:00.102  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-15 04:18:00.112  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-15 04:18:00.113  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-15 04:18:00.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-15 04:18:00.114 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-15 04:18:00.114 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-15 04:18:00.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-15 04:18:00.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:18:00.122 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:18:00.122 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:18:00.309  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-15 04:18:00.309  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-15 04:18:00.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-15 04:18:00.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:18:00.315  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-15 04:18:00.316  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-15 04:18:00.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:18:00.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:18:00.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:18:00.318 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:18:00.318 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:18:00.319 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:18:00.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:18:00.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:18:00.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:18:00.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-15 04:18:00.419 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527685773391511481285783033470674480842075434758 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 15 00:47:12 UTC 2021 Final Date: Mon Sep 15 00:47:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:67:d3:60:9d:db:64:2a:5c:f2:16:85:6d:59:a2:44:e6:26:5c:16] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 88535ee0daf61aa1aae47d097f14f3cdd49beb58 4218eff3a5dea27f88811de20fcfa746c339b4df 667188a6dbc6d3b03ec1fe2337a42e9cfe4f740f fdbd2c36ad1b10e28e47a6a74e29ebc916671e06 fd8d574d3b3f470bfb2722387dd08161b882c4e9 5c55299a3789c44eaf7ac77fb83d239423c43f96 e545d782b5f572ba7f34218b5cbd080fc349a6aa a69f0731925f6f47564d5b958993ffc6c8ebbe79 8bcf92768da4e6bbce1faf7c7cf3693488b78bf6 2dd2533ae210bcf0945f58a77fce4f6c8cd194e4 5486918d5c77f182d93a404d3ce7671fd7721b2c f89d38f9b364f4bcba14e6f4ab02f0155fde8e56 371dc4febe45c0f1352a6deccf3a6469bf713781 9485b729d41110aa7e51118140aed65ba309140c c32bdbfbc507b2bd415b52efc8fecba8d998e2cf b4d3d512d8cfee0eb063332f5f580304bdc7d9c9 0bd86e189165fb300836beed63f55c6858b6f78e 1a43c3aa268e9acd31ac303cb451e4cd52df757e d95a6d006f670c270682115594e82933f3c3d43d e0e78c5c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:2d:db:f3:73:9e:75:d1:76:c2:e7:e2:06:aa:f4:02:52:2d:19:c4] modulus: be7511c9746816326795db4c28960bd5d1d8e521811a43df92b7a1af492ca2c09972c1e94acfb6ef0a49c9233bd2e977fb138b364623ec6393b438695bda9ac9b9cdfd228c938e44249b5a6f89f179a43e0a7b3daf969f5199dfdc43bca082cc0dd019d689a78d48cc393a0ce60d6fadb3bc7adaed00d2ddc3f51a9a3a5bb50b5ccced4ab14720b066efc7908496a7006c4914a0e9c0f0e2335e295dd57740dce245ed81d0c63ffb7579f2cc3165736502e21ffab5ef560083be0239f633064ad25170519fdde1114f1811e5a67f00c526aad35b4a31f6621935c4852367a8eee1e01a871c06f3b22e4974946cf267b27f2b4f28ce14861908ec14f5595e97b9 public exponent: 10001 ] 2021-09-15 04:18:32.578  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-15 04:18:32.580 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-15 04:18:32.582 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-15 04:18:32.583 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-15 04:18:32.584  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-15 04:18:32.584  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-15 04:18:32.585  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-15 04:18:32.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-15 04:18:32.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-15 04:18:32.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-15 04:18:32.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-15 04:18:32.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:18:32.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:18:32.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:18:32.721  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-15 04:18:32.722  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-15 04:18:32.722 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-15 04:18:32.722 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:18:32.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-15 04:18:32.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-15 04:18:32.724 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:18:32.724 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:18:32.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:18:32.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:18:32.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:18:32.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:18:32.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:18:32.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:18:32.727 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:18:32.727 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-15 04:18:32.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527685773391511481285783033470674480842075434758 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 15 00:47:12 UTC 2021 Final Date: Mon Sep 15 00:47:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:67:d3:60:9d:db:64:2a:5c:f2:16:85:6d:59:a2:44:e6:26:5c:16] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 88535ee0daf61aa1aae47d097f14f3cdd49beb58 4218eff3a5dea27f88811de20fcfa746c339b4df 667188a6dbc6d3b03ec1fe2337a42e9cfe4f740f fdbd2c36ad1b10e28e47a6a74e29ebc916671e06 fd8d574d3b3f470bfb2722387dd08161b882c4e9 5c55299a3789c44eaf7ac77fb83d239423c43f96 e545d782b5f572ba7f34218b5cbd080fc349a6aa a69f0731925f6f47564d5b958993ffc6c8ebbe79 8bcf92768da4e6bbce1faf7c7cf3693488b78bf6 2dd2533ae210bcf0945f58a77fce4f6c8cd194e4 5486918d5c77f182d93a404d3ce7671fd7721b2c f89d38f9b364f4bcba14e6f4ab02f0155fde8e56 371dc4febe45c0f1352a6deccf3a6469bf713781 9485b729d41110aa7e51118140aed65ba309140c c32bdbfbc507b2bd415b52efc8fecba8d998e2cf b4d3d512d8cfee0eb063332f5f580304bdc7d9c9 0bd86e189165fb300836beed63f55c6858b6f78e 1a43c3aa268e9acd31ac303cb451e4cd52df757e d95a6d006f670c270682115594e82933f3c3d43d e0e78c5c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0c:29:9d:c3:a4:ff:40:07:ed:1b:b5:43:13:0d:d9:50:78:13:4e:3a] modulus: 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 public exponent: 10001 ] 2021-09-15 04:19:04.972  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-15 04:19:04.974 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-15 04:19:04.976 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-15 04:19:04.977 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-15 04:19:04.977  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-15 04:19:04.978  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-15 04:19:04.979  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-15 04:19:04.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-15 04:19:04.979 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-15 04:19:04.980 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-15 04:19:04.984 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-15 04:19:04.984 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:19:04.985 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:19:04.985 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:19:05.116  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-15 04:19:05.117  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-15 04:19:05.117 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-15 04:19:05.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:19:05.119  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-15 04:19:05.119  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-15 04:19:05.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:19:05.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:19:05.121 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:19:05.122 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:19:05.122 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:19:05.122 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:19:05.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:19:05.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:19:05.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:19:05.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-15 04:19:05.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527685773391511481285783033470674480842075434758 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 15 00:47:12 UTC 2021 Final Date: Mon Sep 15 00:47:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:67:d3:60:9d:db:64:2a:5c:f2:16:85:6d:59:a2:44:e6:26:5c:16] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 88535ee0daf61aa1aae47d097f14f3cdd49beb58 4218eff3a5dea27f88811de20fcfa746c339b4df 667188a6dbc6d3b03ec1fe2337a42e9cfe4f740f fdbd2c36ad1b10e28e47a6a74e29ebc916671e06 fd8d574d3b3f470bfb2722387dd08161b882c4e9 5c55299a3789c44eaf7ac77fb83d239423c43f96 e545d782b5f572ba7f34218b5cbd080fc349a6aa a69f0731925f6f47564d5b958993ffc6c8ebbe79 8bcf92768da4e6bbce1faf7c7cf3693488b78bf6 2dd2533ae210bcf0945f58a77fce4f6c8cd194e4 5486918d5c77f182d93a404d3ce7671fd7721b2c f89d38f9b364f4bcba14e6f4ab02f0155fde8e56 371dc4febe45c0f1352a6deccf3a6469bf713781 9485b729d41110aa7e51118140aed65ba309140c c32bdbfbc507b2bd415b52efc8fecba8d998e2cf b4d3d512d8cfee0eb063332f5f580304bdc7d9c9 0bd86e189165fb300836beed63f55c6858b6f78e 1a43c3aa268e9acd31ac303cb451e4cd52df757e d95a6d006f670c270682115594e82933f3c3d43d e0e78c5c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:7e:8e:ef:e3:a1:50:5c:36:1b:4a:5f:8f:52:05:5f:23:61:ff:36] modulus: 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 public exponent: 10001 ] 2021-09-15 04:19:10.396  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-15 04:19:10.397 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-15 04:19:10.399 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-15 04:19:10.400 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-15 04:19:10.400  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-15 04:19:10.400  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-15 04:19:10.401  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-15 04:19:10.401 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-15 04:19:10.401 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-15 04:19:10.401 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-15 04:19:10.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-15 04:19:10.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:19:10.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:19:10.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:19:10.513  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-15 04:19:10.514  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-15 04:19:10.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-15 04:19:10.515 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:19:10.516  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-15 04:19:10.517  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-15 04:19:10.517 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:19:10.518 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:19:10.518 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:19:10.519 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:19:10.519 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:19:10.519 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:19:10.520 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:19:10.521 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:19:10.521 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:19:10.522 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-15 04:19:10.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527685773391511481285783033470674480842075434758 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 15 00:47:12 UTC 2021 Final Date: Mon Sep 15 00:47:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:67:d3:60:9d:db:64:2a:5c:f2:16:85:6d:59:a2:44:e6:26:5c:16] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 88535ee0daf61aa1aae47d097f14f3cdd49beb58 4218eff3a5dea27f88811de20fcfa746c339b4df 667188a6dbc6d3b03ec1fe2337a42e9cfe4f740f fdbd2c36ad1b10e28e47a6a74e29ebc916671e06 fd8d574d3b3f470bfb2722387dd08161b882c4e9 5c55299a3789c44eaf7ac77fb83d239423c43f96 e545d782b5f572ba7f34218b5cbd080fc349a6aa a69f0731925f6f47564d5b958993ffc6c8ebbe79 8bcf92768da4e6bbce1faf7c7cf3693488b78bf6 2dd2533ae210bcf0945f58a77fce4f6c8cd194e4 5486918d5c77f182d93a404d3ce7671fd7721b2c f89d38f9b364f4bcba14e6f4ab02f0155fde8e56 371dc4febe45c0f1352a6deccf3a6469bf713781 9485b729d41110aa7e51118140aed65ba309140c c32bdbfbc507b2bd415b52efc8fecba8d998e2cf b4d3d512d8cfee0eb063332f5f580304bdc7d9c9 0bd86e189165fb300836beed63f55c6858b6f78e 1a43c3aa268e9acd31ac303cb451e4cd52df757e d95a6d006f670c270682115594e82933f3c3d43d e0e78c5c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:24:48:7c:d6:3d:35:69:b9:62:61:b0:3c:85:06:03:97:b9:fb:cd] modulus: db1b5f6c09deb70403757c4b9552e0f75c033809415315e9c35bac174d5d956e38ad1f22748698646b0fe0d51dc1627bfe7ccd6c119a89e1bb20f115fdf7e6c26d20a0db3389734de0f05d95aba1be51a82ca2a399d182315ff23b728d38ed117ae41fbfb4b3162de13f544395afba68666a4e08e9ecb579a93bdf63a2205ff123b23dc987d6eb78f98154351a192ce65e650dbb39ac9b7d5db2ada53126867c4561098262ac9bcf71b65e662dbf2cb42ff8740f8372b7b939174ad86fc16e52aee9b12fe3381732ec3998fe6cef80672a20db896cebab4abc3f414ae597d1496b2bad72ea0ec2868bb1b246e79f7675eca2413d401b99c9c94c3f367c147da7 public exponent: 10001 ] 2021-09-15 04:21:59.132  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-15 04:21:59.133 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-15 04:21:59.136 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-15 04:21:59.136 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-15 04:21:59.136  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-15 04:21:59.137  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-15 04:21:59.137  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-15 04:21:59.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-15 04:21:59.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-15 04:21:59.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-15 04:21:59.144 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-15 04:21:59.145 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:21:59.145 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-15 04:21:59.145 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:21:59.336  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-15 04:21:59.337  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-15 04:21:59.337 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-15 04:21:59.337 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-15 04:21:59.339  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-15 04:21:59.340  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-15 04:21:59.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:21:59.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:21:59.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:21:59.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:21:59.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:21:59.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:21:59.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-15 04:21:59.343 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-15 04:21:59.343 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-15 04:21:59.344 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-15 04:21:59.346 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 527685773391511481285783033470674480842075434758 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 15 00:47:12 UTC 2021 Final Date: Mon Sep 15 00:47:11 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3e:67:d3:60:9d:db:64:2a:5c:f2:16:85:6d:59:a2:44:e6:26:5c:16] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 88535ee0daf61aa1aae47d097f14f3cdd49beb58 4218eff3a5dea27f88811de20fcfa746c339b4df 667188a6dbc6d3b03ec1fe2337a42e9cfe4f740f fdbd2c36ad1b10e28e47a6a74e29ebc916671e06 fd8d574d3b3f470bfb2722387dd08161b882c4e9 5c55299a3789c44eaf7ac77fb83d239423c43f96 e545d782b5f572ba7f34218b5cbd080fc349a6aa a69f0731925f6f47564d5b958993ffc6c8ebbe79 8bcf92768da4e6bbce1faf7c7cf3693488b78bf6 2dd2533ae210bcf0945f58a77fce4f6c8cd194e4 5486918d5c77f182d93a404d3ce7671fd7721b2c f89d38f9b364f4bcba14e6f4ab02f0155fde8e56 371dc4febe45c0f1352a6deccf3a6469bf713781 9485b729d41110aa7e51118140aed65ba309140c c32bdbfbc507b2bd415b52efc8fecba8d998e2cf b4d3d512d8cfee0eb063332f5f580304bdc7d9c9 0bd86e189165fb300836beed63f55c6858b6f78e 1a43c3aa268e9acd31ac303cb451e4cd52df757e d95a6d006f670c270682115594e82933f3c3d43d e0e78c5c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:2f:45:41:1a:9f:39:1c:a1:70:2c:cd:7b:c3:aa:01:15:32:0d:0e] modulus: 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 public exponent: 10001 ]