2021-09-23 07:36:07,894 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-23 07:36:11,489 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-23 07:36:13.888  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-09-23 07:36:24.793 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-23 07:36:25.806  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-09-23 07:36:26.383  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-23 07:36:36.695  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 30.601 seconds (JVM running for 36.473) 2021-09-23 07:37:31.900  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-23 07:37:31.990 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-23 07:37:32.086 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-23 07:37:32.089 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-23 07:37:32.185  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-23 07:37:32.189  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-23 07:37:32.190  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-23 07:37:32.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 07:37:32.192 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 07:37:32.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 07:37:32.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-23 07:37:32.205 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-23 07:37:32.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-23 07:37:32.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 07:37:32.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 07:37:32.405 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 07:37:33.642  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-23 07:37:33.646  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-23 07:37:33.647 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-23 07:37:33.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 07:37:33.660  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-23 07:37:33.682  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-23 07:37:33.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 07:37:33.684 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 07:37:33.684 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 07:37:33.697 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 07:37:33.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 07:37:33.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 07:37:33.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 07:37:33.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 07:37:33.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 07:37:33.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-23 07:37:33.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203982399419787608094156021732350319896905895946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 23 07:32:48 UTC 2021 Final Date: Tue Sep 23 07:32:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:7f:1d:d7:68:17:3f:d7:9d:71:8f:80:39:a3:d1:97:62:ac:c1:81] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01555c9ef3b1b556faf7b5a001a17642623ffd55 3bbef859da7d69b899bf38d8aec3c12f24c8315a b70463bf70cfacceaea5a6ab2b41bc5a0014cfce da0bebbbbf0a3bb74419626e0421670f29a633da 3e081f5b1aef662278382c138dbb65c36a663f4d 041c7902433e5751d1dcf8def15601893ea5d2b3 4c8ac6d9fdcf1351d3a58655f2b22432d76feef0 a02961c3bfb087db1d528f797c7ff969eb7b9a07 c0e3a2b3fca15582e7e95ffee3281f02ad159e68 1285c547885a9718411453bc04b4adcd104663f8 fca9650ff88a16d9439b35cc82c44327e8329d3c b79e519183cb429467bed7d27c10d796355492a8 7781b4bca00d656b2f6406bc00256276379486da b79e663645609a047b1d6424af1beda82f84fcca 8b767ce2ebd7593994b8228988cb007ad48528e0 370940e26480026f917ebcc4decc627cf524d79a 2ddaf2031f8822a0bf6f10609cf8419b44c7f1ca ec80d4bf1f5957b98e58050857e8f25a1c10a37a 5660860ac7e7b5e886bb711f34cb7ea7b71c3852 6f87947d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e3:9b:2f:59:78:ae:18:b1:03:fb:ec:4e:fe:c9:69:ed:1e:d6:65:cb] modulus: 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 public exponent: 10001 ] 2021-09-23 10:46:49.055  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-23 10:46:49.057 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-23 10:46:49.059 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-23 10:46:49.060 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-23 10:46:49.061  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-23 10:46:49.061  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-23 10:46:49.062  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-23 10:46:49.062 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 10:46:49.063 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-23 10:46:49.063 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-23 10:46:49.086 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-23 10:46:49.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:46:49.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:46:49.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:46:49.301  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-23 10:46:49.302  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-23 10:46:49.302 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-23 10:46:49.303 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:46:49.305  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-23 10:46:49.305  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-23 10:46:49.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:46:49.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:46:49.307 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:46:49.308 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:46:49.308 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:46:49.308 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:46:49.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:46:49.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:46:49.310 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:46:49.311 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-23 10:46:49.316 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203982399419787608094156021732350319896905895946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 23 07:32:48 UTC 2021 Final Date: Tue Sep 23 07:32:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:7f:1d:d7:68:17:3f:d7:9d:71:8f:80:39:a3:d1:97:62:ac:c1:81] modulus: d8f7075d81c27c66e8388e154613a93cae4e4ac0dca66cb8374fc77da30a7f03dd2c3b43d65a22181659fee85f752ac1b2c6fd04666359a4b9a0cc8d79902255f2edd12ba33c32f728ab2e59f06dc9c6b75ddae86d75eb338a17a3c8f8a08ed59901a0803be37c3e7fb81fe4af88e573f4cd9c6798825f98f4ba909efeeab68c24512ce3c8d03f81f6485f832c32b27db1a7a18956afd66d9f0c4b7a56b4f56e9ada895fc65d07b5e22b0031392d19a1457ee0429141eaecc66cd51016bbfe70d7c1ee2a4755beb297fb61ead7d04cd8ac37ab58343283dc809476cb6d663cd9d332cbc629eb2128d0170b3e203bc74e37cdc5f3f0919b8adeb347296cc5fafd230e0b2c700bf0fab09f6ca48c3ea5dbc22c7bedff557f8514a510ddccea9cf655bdb56c184c53bb5cf814d44d00bfb705b7b6ecf06e5a1b3d0266863e16a4995f01a3c54efe00bebd1061155e146fecc9528fed69672c60c1d5e2750aa208564ac9030f8ad580d22f58b4f2799a733816425e1e57c824adcd2790918e27cd25 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01555c9ef3b1b556faf7b5a001a17642623ffd55 3bbef859da7d69b899bf38d8aec3c12f24c8315a b70463bf70cfacceaea5a6ab2b41bc5a0014cfce da0bebbbbf0a3bb74419626e0421670f29a633da 3e081f5b1aef662278382c138dbb65c36a663f4d 041c7902433e5751d1dcf8def15601893ea5d2b3 4c8ac6d9fdcf1351d3a58655f2b22432d76feef0 a02961c3bfb087db1d528f797c7ff969eb7b9a07 c0e3a2b3fca15582e7e95ffee3281f02ad159e68 1285c547885a9718411453bc04b4adcd104663f8 fca9650ff88a16d9439b35cc82c44327e8329d3c b79e519183cb429467bed7d27c10d796355492a8 7781b4bca00d656b2f6406bc00256276379486da b79e663645609a047b1d6424af1beda82f84fcca 8b767ce2ebd7593994b8228988cb007ad48528e0 370940e26480026f917ebcc4decc627cf524d79a 2ddaf2031f8822a0bf6f10609cf8419b44c7f1ca ec80d4bf1f5957b98e58050857e8f25a1c10a37a 5660860ac7e7b5e886bb711f34cb7ea7b71c3852 6f87947d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:88:1b:86:01:40:70:45:5c:84:56:b3:2b:1b:9b:57:aa:6c:89:a6] modulus: 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 public exponent: 10001 ] 2021-09-23 10:48:49.465  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-23 10:48:49.466 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-23 10:48:49.468 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-23 10:48:49.469 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-23 10:48:49.470  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-23 10:48:49.471  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-23 10:48:49.472  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-23 10:48:49.472 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 10:48:49.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-23 10:48:49.474 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-23 10:48:49.481 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-23 10:48:49.481 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:48:49.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:48:49.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:48:49.579  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-23 10:48:49.581  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-23 10:48:49.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-23 10:48:49.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:48:49.584  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-23 10:48:49.585  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-23 10:48:49.585 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:48:49.585 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:48:49.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:48:49.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:48:49.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:48:49.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:48:49.588 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:48:49.588 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:48:49.589 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:48:49.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-23 10:48:49.593 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203982399419787608094156021732350319896905895946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 23 07:32:48 UTC 2021 Final Date: Tue Sep 23 07:32:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:7f:1d:d7:68:17:3f:d7:9d:71:8f:80:39:a3:d1:97:62:ac:c1:81] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01555c9ef3b1b556faf7b5a001a17642623ffd55 3bbef859da7d69b899bf38d8aec3c12f24c8315a b70463bf70cfacceaea5a6ab2b41bc5a0014cfce da0bebbbbf0a3bb74419626e0421670f29a633da 3e081f5b1aef662278382c138dbb65c36a663f4d 041c7902433e5751d1dcf8def15601893ea5d2b3 4c8ac6d9fdcf1351d3a58655f2b22432d76feef0 a02961c3bfb087db1d528f797c7ff969eb7b9a07 c0e3a2b3fca15582e7e95ffee3281f02ad159e68 1285c547885a9718411453bc04b4adcd104663f8 fca9650ff88a16d9439b35cc82c44327e8329d3c b79e519183cb429467bed7d27c10d796355492a8 7781b4bca00d656b2f6406bc00256276379486da b79e663645609a047b1d6424af1beda82f84fcca 8b767ce2ebd7593994b8228988cb007ad48528e0 370940e26480026f917ebcc4decc627cf524d79a 2ddaf2031f8822a0bf6f10609cf8419b44c7f1ca ec80d4bf1f5957b98e58050857e8f25a1c10a37a 5660860ac7e7b5e886bb711f34cb7ea7b71c3852 6f87947d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:1e:59:1b:82:cf:a9:6e:f5:be:46:26:3f:8d:ed:9b:ec:17:dc:d8] modulus: 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 public exponent: 10001 ] 2021-09-23 10:52:42.571  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-23 10:52:42.572 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-23 10:52:42.573 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-23 10:52:42.574 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-23 10:52:42.574  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-23 10:52:42.575  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-23 10:52:42.576  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-23 10:52:42.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 10:52:42.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-23 10:52:42.577 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-23 10:52:42.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-23 10:52:42.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:52:42.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:52:42.586 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:52:42.676  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-23 10:52:42.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-23 10:52:42.681 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-23 10:52:42.681 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:52:42.683  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-23 10:52:42.683  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-23 10:52:42.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:52:42.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:52:42.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:52:42.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:52:42.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:52:42.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:52:42.687 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:52:42.687 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:52:42.688 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:52:42.688 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-23 10:52:42.691 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203982399419787608094156021732350319896905895946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 23 07:32:48 UTC 2021 Final Date: Tue Sep 23 07:32:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:7f:1d:d7:68:17:3f:d7:9d:71:8f:80:39:a3:d1:97:62:ac:c1:81] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01555c9ef3b1b556faf7b5a001a17642623ffd55 3bbef859da7d69b899bf38d8aec3c12f24c8315a b70463bf70cfacceaea5a6ab2b41bc5a0014cfce da0bebbbbf0a3bb74419626e0421670f29a633da 3e081f5b1aef662278382c138dbb65c36a663f4d 041c7902433e5751d1dcf8def15601893ea5d2b3 4c8ac6d9fdcf1351d3a58655f2b22432d76feef0 a02961c3bfb087db1d528f797c7ff969eb7b9a07 c0e3a2b3fca15582e7e95ffee3281f02ad159e68 1285c547885a9718411453bc04b4adcd104663f8 fca9650ff88a16d9439b35cc82c44327e8329d3c b79e519183cb429467bed7d27c10d796355492a8 7781b4bca00d656b2f6406bc00256276379486da b79e663645609a047b1d6424af1beda82f84fcca 8b767ce2ebd7593994b8228988cb007ad48528e0 370940e26480026f917ebcc4decc627cf524d79a 2ddaf2031f8822a0bf6f10609cf8419b44c7f1ca ec80d4bf1f5957b98e58050857e8f25a1c10a37a 5660860ac7e7b5e886bb711f34cb7ea7b71c3852 6f87947d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:97:d8:d7:d6:3f:04:bd:b6:52:0e:43:71:75:8a:3b:ee:10:9b:d7] modulus: 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 public exponent: 10001 ] 2021-09-23 10:53:14.760  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-23 10:53:14.762 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-23 10:53:14.763 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-23 10:53:14.764 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-23 10:53:14.764  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-23 10:53:14.765  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-23 10:53:14.765  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-23 10:53:14.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 10:53:14.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-23 10:53:14.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-23 10:53:14.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-23 10:53:14.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:53:14.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:53:14.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:53:14.874  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-23 10:53:14.881  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-23 10:53:14.882 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-23 10:53:14.882 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:53:14.883  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-23 10:53:14.884  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-23 10:53:14.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:53:14.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:53:14.885 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:53:14.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:53:14.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:53:14.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:53:14.887 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:53:14.887 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:53:14.888 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:53:14.888 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-23 10:53:14.891 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203982399419787608094156021732350319896905895946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 23 07:32:48 UTC 2021 Final Date: Tue Sep 23 07:32:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:7f:1d:d7:68:17:3f:d7:9d:71:8f:80:39:a3:d1:97:62:ac:c1:81] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01555c9ef3b1b556faf7b5a001a17642623ffd55 3bbef859da7d69b899bf38d8aec3c12f24c8315a b70463bf70cfacceaea5a6ab2b41bc5a0014cfce da0bebbbbf0a3bb74419626e0421670f29a633da 3e081f5b1aef662278382c138dbb65c36a663f4d 041c7902433e5751d1dcf8def15601893ea5d2b3 4c8ac6d9fdcf1351d3a58655f2b22432d76feef0 a02961c3bfb087db1d528f797c7ff969eb7b9a07 c0e3a2b3fca15582e7e95ffee3281f02ad159e68 1285c547885a9718411453bc04b4adcd104663f8 fca9650ff88a16d9439b35cc82c44327e8329d3c b79e519183cb429467bed7d27c10d796355492a8 7781b4bca00d656b2f6406bc00256276379486da b79e663645609a047b1d6424af1beda82f84fcca 8b767ce2ebd7593994b8228988cb007ad48528e0 370940e26480026f917ebcc4decc627cf524d79a 2ddaf2031f8822a0bf6f10609cf8419b44c7f1ca ec80d4bf1f5957b98e58050857e8f25a1c10a37a 5660860ac7e7b5e886bb711f34cb7ea7b71c3852 6f87947d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:a6:b3:a9:ee:82:9f:eb:e3:8a:5d:56:8a:3c:5f:b3:33:25:04:b3] modulus: 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 public exponent: 10001 ] 2021-09-23 10:55:34.674  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-23 10:55:34.675 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-23 10:55:34.676 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-23 10:55:34.677 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-23 10:55:34.677  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-23 10:55:34.677  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-23 10:55:34.678  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-23 10:55:34.678 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 10:55:34.678 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-23 10:55:34.679 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-23 10:55:34.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-23 10:55:34.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:55:34.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:55:34.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:55:34.786  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-23 10:55:34.787  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-23 10:55:34.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-23 10:55:34.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:55:34.788  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-23 10:55:34.788  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-23 10:55:34.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:55:34.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:55:34.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:55:34.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:55:34.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:55:34.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:55:34.791 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:55:34.791 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:55:34.792 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:55:34.792 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-23 10:55:34.796 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203982399419787608094156021732350319896905895946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 23 07:32:48 UTC 2021 Final Date: Tue Sep 23 07:32:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:7f:1d:d7:68:17:3f:d7:9d:71:8f:80:39:a3:d1:97:62:ac:c1:81] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01555c9ef3b1b556faf7b5a001a17642623ffd55 3bbef859da7d69b899bf38d8aec3c12f24c8315a b70463bf70cfacceaea5a6ab2b41bc5a0014cfce da0bebbbbf0a3bb74419626e0421670f29a633da 3e081f5b1aef662278382c138dbb65c36a663f4d 041c7902433e5751d1dcf8def15601893ea5d2b3 4c8ac6d9fdcf1351d3a58655f2b22432d76feef0 a02961c3bfb087db1d528f797c7ff969eb7b9a07 c0e3a2b3fca15582e7e95ffee3281f02ad159e68 1285c547885a9718411453bc04b4adcd104663f8 fca9650ff88a16d9439b35cc82c44327e8329d3c b79e519183cb429467bed7d27c10d796355492a8 7781b4bca00d656b2f6406bc00256276379486da b79e663645609a047b1d6424af1beda82f84fcca 8b767ce2ebd7593994b8228988cb007ad48528e0 370940e26480026f917ebcc4decc627cf524d79a 2ddaf2031f8822a0bf6f10609cf8419b44c7f1ca ec80d4bf1f5957b98e58050857e8f25a1c10a37a 5660860ac7e7b5e886bb711f34cb7ea7b71c3852 6f87947d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:7b:c6:7c:ff:9c:57:e1:6c:e0:3b:b1:b3:12:9f:fc:94:06:ee:4e] modulus: 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 public exponent: 10001 ] 2021-09-23 10:57:36.938  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-23 10:57:36.939 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-23 10:57:36.940 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-23 10:57:36.940 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-23 10:57:36.940  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-23 10:57:36.941  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-23 10:57:36.941  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-23 10:57:36.941 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 10:57:36.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-23 10:57:36.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-23 10:57:36.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-23 10:57:36.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:57:36.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:57:36.947 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:57:37.081  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-23 10:57:37.082  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-23 10:57:37.082 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-23 10:57:37.082 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:57:37.084  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-23 10:57:37.084  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-23 10:57:37.084 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:57:37.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:57:37.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:57:37.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:57:37.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:57:37.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:57:37.087 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:57:37.087 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:57:37.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:57:37.089 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-23 10:57:37.091 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203982399419787608094156021732350319896905895946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 23 07:32:48 UTC 2021 Final Date: Tue Sep 23 07:32:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:7f:1d:d7:68:17:3f:d7:9d:71:8f:80:39:a3:d1:97:62:ac:c1:81] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01555c9ef3b1b556faf7b5a001a17642623ffd55 3bbef859da7d69b899bf38d8aec3c12f24c8315a b70463bf70cfacceaea5a6ab2b41bc5a0014cfce da0bebbbbf0a3bb74419626e0421670f29a633da 3e081f5b1aef662278382c138dbb65c36a663f4d 041c7902433e5751d1dcf8def15601893ea5d2b3 4c8ac6d9fdcf1351d3a58655f2b22432d76feef0 a02961c3bfb087db1d528f797c7ff969eb7b9a07 c0e3a2b3fca15582e7e95ffee3281f02ad159e68 1285c547885a9718411453bc04b4adcd104663f8 fca9650ff88a16d9439b35cc82c44327e8329d3c b79e519183cb429467bed7d27c10d796355492a8 7781b4bca00d656b2f6406bc00256276379486da b79e663645609a047b1d6424af1beda82f84fcca 8b767ce2ebd7593994b8228988cb007ad48528e0 370940e26480026f917ebcc4decc627cf524d79a 2ddaf2031f8822a0bf6f10609cf8419b44c7f1ca ec80d4bf1f5957b98e58050857e8f25a1c10a37a 5660860ac7e7b5e886bb711f34cb7ea7b71c3852 6f87947d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:40:5a:80:9c:89:0d:8d:43:30:e0:89:fc:ea:22:be:be:09:54:94] modulus: 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 public exponent: 10001 ] 2021-09-23 10:58:07.876  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-23 10:58:07.877 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-23 10:58:07.878 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-23 10:58:07.879 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-23 10:58:07.879  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-23 10:58:07.879  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-23 10:58:07.880  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-23 10:58:07.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 10:58:07.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-23 10:58:07.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-23 10:58:07.884 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-23 10:58:07.885 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:58:07.885 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:58:07.885 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:58:07.975  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-23 10:58:07.975  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-23 10:58:07.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-23 10:58:07.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:58:07.982  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-23 10:58:07.982  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-23 10:58:07.983 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:58:07.983 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:58:07.983 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:58:07.984 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:58:07.984 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:58:07.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:58:07.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:58:07.986 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:58:07.986 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:58:07.987 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-23 10:58:07.989 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203982399419787608094156021732350319896905895946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 23 07:32:48 UTC 2021 Final Date: Tue Sep 23 07:32:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:7f:1d:d7:68:17:3f:d7:9d:71:8f:80:39:a3:d1:97:62:ac:c1:81] modulus: d8f7075d81c27c66e8388e154613a93cae4e4ac0dca66cb8374fc77da30a7f03dd2c3b43d65a22181659fee85f752ac1b2c6fd04666359a4b9a0cc8d79902255f2edd12ba33c32f728ab2e59f06dc9c6b75ddae86d75eb338a17a3c8f8a08ed59901a0803be37c3e7fb81fe4af88e573f4cd9c6798825f98f4ba909efeeab68c24512ce3c8d03f81f6485f832c32b27db1a7a18956afd66d9f0c4b7a56b4f56e9ada895fc65d07b5e22b0031392d19a1457ee0429141eaecc66cd51016bbfe70d7c1ee2a4755beb297fb61ead7d04cd8ac37ab58343283dc809476cb6d663cd9d332cbc629eb2128d0170b3e203bc74e37cdc5f3f0919b8adeb347296cc5fafd230e0b2c700bf0fab09f6ca48c3ea5dbc22c7bedff557f8514a510ddccea9cf655bdb56c184c53bb5cf814d44d00bfb705b7b6ecf06e5a1b3d0266863e16a4995f01a3c54efe00bebd1061155e146fecc9528fed69672c60c1d5e2750aa208564ac9030f8ad580d22f58b4f2799a733816425e1e57c824adcd2790918e27cd25 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01555c9ef3b1b556faf7b5a001a17642623ffd55 3bbef859da7d69b899bf38d8aec3c12f24c8315a b70463bf70cfacceaea5a6ab2b41bc5a0014cfce da0bebbbbf0a3bb74419626e0421670f29a633da 3e081f5b1aef662278382c138dbb65c36a663f4d 041c7902433e5751d1dcf8def15601893ea5d2b3 4c8ac6d9fdcf1351d3a58655f2b22432d76feef0 a02961c3bfb087db1d528f797c7ff969eb7b9a07 c0e3a2b3fca15582e7e95ffee3281f02ad159e68 1285c547885a9718411453bc04b4adcd104663f8 fca9650ff88a16d9439b35cc82c44327e8329d3c b79e519183cb429467bed7d27c10d796355492a8 7781b4bca00d656b2f6406bc00256276379486da b79e663645609a047b1d6424af1beda82f84fcca 8b767ce2ebd7593994b8228988cb007ad48528e0 370940e26480026f917ebcc4decc627cf524d79a 2ddaf2031f8822a0bf6f10609cf8419b44c7f1ca ec80d4bf1f5957b98e58050857e8f25a1c10a37a 5660860ac7e7b5e886bb711f34cb7ea7b71c3852 6f87947d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:1d:14:04:61:85:95:c8:a6:e4:c4:56:06:45:72:9d:53:f5:b9:39] modulus: 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 public exponent: 10001 ] 2021-09-23 10:58:41.051  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-23 10:58:41.052 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-23 10:58:41.053 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-23 10:58:41.053 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-23 10:58:41.054  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-23 10:58:41.054  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-23 10:58:41.054  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-23 10:58:41.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 10:58:41.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-23 10:58:41.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-23 10:58:41.059 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-23 10:58:41.059 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:58:41.059 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 10:58:41.060 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:58:41.136  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-23 10:58:41.137  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-23 10:58:41.137 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-23 10:58:41.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 10:58:41.139  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-23 10:58:41.139  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-23 10:58:41.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:58:41.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:58:41.140 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:58:41.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:58:41.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:58:41.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:58:41.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 10:58:41.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 10:58:41.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 10:58:41.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-23 10:58:41.146 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203982399419787608094156021732350319896905895946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 23 07:32:48 UTC 2021 Final Date: Tue Sep 23 07:32:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:7f:1d:d7:68:17:3f:d7:9d:71:8f:80:39:a3:d1:97:62:ac:c1:81] modulus: d8f7075d81c27c66e8388e154613a93cae4e4ac0dca66cb8374fc77da30a7f03dd2c3b43d65a22181659fee85f752ac1b2c6fd04666359a4b9a0cc8d79902255f2edd12ba33c32f728ab2e59f06dc9c6b75ddae86d75eb338a17a3c8f8a08ed59901a0803be37c3e7fb81fe4af88e573f4cd9c6798825f98f4ba909efeeab68c24512ce3c8d03f81f6485f832c32b27db1a7a18956afd66d9f0c4b7a56b4f56e9ada895fc65d07b5e22b0031392d19a1457ee0429141eaecc66cd51016bbfe70d7c1ee2a4755beb297fb61ead7d04cd8ac37ab58343283dc809476cb6d663cd9d332cbc629eb2128d0170b3e203bc74e37cdc5f3f0919b8adeb347296cc5fafd230e0b2c700bf0fab09f6ca48c3ea5dbc22c7bedff557f8514a510ddccea9cf655bdb56c184c53bb5cf814d44d00bfb705b7b6ecf06e5a1b3d0266863e16a4995f01a3c54efe00bebd1061155e146fecc9528fed69672c60c1d5e2750aa208564ac9030f8ad580d22f58b4f2799a733816425e1e57c824adcd2790918e27cd25 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01555c9ef3b1b556faf7b5a001a17642623ffd55 3bbef859da7d69b899bf38d8aec3c12f24c8315a b70463bf70cfacceaea5a6ab2b41bc5a0014cfce da0bebbbbf0a3bb74419626e0421670f29a633da 3e081f5b1aef662278382c138dbb65c36a663f4d 041c7902433e5751d1dcf8def15601893ea5d2b3 4c8ac6d9fdcf1351d3a58655f2b22432d76feef0 a02961c3bfb087db1d528f797c7ff969eb7b9a07 c0e3a2b3fca15582e7e95ffee3281f02ad159e68 1285c547885a9718411453bc04b4adcd104663f8 fca9650ff88a16d9439b35cc82c44327e8329d3c b79e519183cb429467bed7d27c10d796355492a8 7781b4bca00d656b2f6406bc00256276379486da b79e663645609a047b1d6424af1beda82f84fcca 8b767ce2ebd7593994b8228988cb007ad48528e0 370940e26480026f917ebcc4decc627cf524d79a 2ddaf2031f8822a0bf6f10609cf8419b44c7f1ca ec80d4bf1f5957b98e58050857e8f25a1c10a37a 5660860ac7e7b5e886bb711f34cb7ea7b71c3852 6f87947d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a5:43:55:c2:a8:d3:ed:0d:0f:6c:37:d4:32:af:d2:86:3b:1d:90:6c] modulus: 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 public exponent: 10001 ] 2021-09-23 11:01:46.197  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-23 11:01:46.198 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-23 11:01:46.206 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-23 11:01:46.207 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-23 11:01:46.207  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-23 11:01:46.207  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-23 11:01:46.208  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-23 11:01:46.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 11:01:46.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-23 11:01:46.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-23 11:01:46.288 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-23 11:01:46.289 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 11:01:46.289 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 11:01:46.289 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 11:01:46.383  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-23 11:01:46.384  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-23 11:01:46.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-23 11:01:46.384 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 11:01:46.385  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-23 11:01:46.386  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-23 11:01:46.386 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 11:01:46.386 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 11:01:46.387 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 11:01:46.387 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 11:01:46.387 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 11:01:46.388 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 11:01:46.388 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 11:01:46.388 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 11:01:46.388 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 11:01:46.389 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-23 11:01:46.391 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203982399419787608094156021732350319896905895946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 23 07:32:48 UTC 2021 Final Date: Tue Sep 23 07:32:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:7f:1d:d7:68:17:3f:d7:9d:71:8f:80:39:a3:d1:97:62:ac:c1:81] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01555c9ef3b1b556faf7b5a001a17642623ffd55 3bbef859da7d69b899bf38d8aec3c12f24c8315a b70463bf70cfacceaea5a6ab2b41bc5a0014cfce da0bebbbbf0a3bb74419626e0421670f29a633da 3e081f5b1aef662278382c138dbb65c36a663f4d 041c7902433e5751d1dcf8def15601893ea5d2b3 4c8ac6d9fdcf1351d3a58655f2b22432d76feef0 a02961c3bfb087db1d528f797c7ff969eb7b9a07 c0e3a2b3fca15582e7e95ffee3281f02ad159e68 1285c547885a9718411453bc04b4adcd104663f8 fca9650ff88a16d9439b35cc82c44327e8329d3c b79e519183cb429467bed7d27c10d796355492a8 7781b4bca00d656b2f6406bc00256276379486da b79e663645609a047b1d6424af1beda82f84fcca 8b767ce2ebd7593994b8228988cb007ad48528e0 370940e26480026f917ebcc4decc627cf524d79a 2ddaf2031f8822a0bf6f10609cf8419b44c7f1ca ec80d4bf1f5957b98e58050857e8f25a1c10a37a 5660860ac7e7b5e886bb711f34cb7ea7b71c3852 6f87947d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:83:fa:6e:57:87:2e:62:9b:1f:b1:8b:e9:51:2c:a0:14:54:97:0b] modulus: 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 public exponent: 10001 ] 2021-09-23 11:03:33.777  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-23 11:03:33.778 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-23 11:03:33.779 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-23 11:03:33.780 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-23 11:03:33.780  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-23 11:03:33.780  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-23 11:03:33.781  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-23 11:03:33.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-23 11:03:33.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-23 11:03:33.782 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-23 11:03:33.785 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-23 11:03:33.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 11:03:33.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-23 11:03:33.786 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 11:03:33.877  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-23 11:03:33.881  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-23 11:03:33.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-23 11:03:33.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-23 11:03:33.883  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-23 11:03:33.884  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-23 11:03:33.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 11:03:33.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 11:03:33.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 11:03:33.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 11:03:33.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 11:03:33.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 11:03:33.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-23 11:03:33.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-23 11:03:33.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-23 11:03:33.887 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-23 11:03:33.889 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 203982399419787608094156021732350319896905895946 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Sep 23 07:32:48 UTC 2021 Final Date: Tue Sep 23 07:32:47 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:7f:1d:d7:68:17:3f:d7:9d:71:8f:80:39:a3:d1:97:62:ac:c1:81] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 01555c9ef3b1b556faf7b5a001a17642623ffd55 3bbef859da7d69b899bf38d8aec3c12f24c8315a b70463bf70cfacceaea5a6ab2b41bc5a0014cfce da0bebbbbf0a3bb74419626e0421670f29a633da 3e081f5b1aef662278382c138dbb65c36a663f4d 041c7902433e5751d1dcf8def15601893ea5d2b3 4c8ac6d9fdcf1351d3a58655f2b22432d76feef0 a02961c3bfb087db1d528f797c7ff969eb7b9a07 c0e3a2b3fca15582e7e95ffee3281f02ad159e68 1285c547885a9718411453bc04b4adcd104663f8 fca9650ff88a16d9439b35cc82c44327e8329d3c b79e519183cb429467bed7d27c10d796355492a8 7781b4bca00d656b2f6406bc00256276379486da b79e663645609a047b1d6424af1beda82f84fcca 8b767ce2ebd7593994b8228988cb007ad48528e0 370940e26480026f917ebcc4decc627cf524d79a 2ddaf2031f8822a0bf6f10609cf8419b44c7f1ca ec80d4bf1f5957b98e58050857e8f25a1c10a37a 5660860ac7e7b5e886bb711f34cb7ea7b71c3852 6f87947d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:cb:a1:47:50:20:8b:1c:e3:6d:4e:3f:77:8b:64:54:30:ac:91:3c] modulus: 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 public exponent: 10001 ]