2021-09-24 00:35:34,697 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-24 00:35:39,193 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-24 00:35:42.700  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-09-24 00:35:57.484 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-24 00:35:58.604  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-09-24 00:35:59.400  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-24 00:36:12.397  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 40.312 seconds (JVM running for 48.193) 2021-09-24 00:37:41.897  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 00:37:41.993 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 00:37:42.189 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-24 00:37:42.192 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 00:37:42.287  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-24 00:37:42.291  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 00:37:42.292  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 00:37:42.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 00:37:42.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 00:37:42.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 00:37:42.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 00:37:42.388 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 00:37:42.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 00:37:42.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 00:37:42.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 00:37:42.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 00:37:44.176  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 00:37:44.179  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 00:37:44.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 00:37:44.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 00:37:44.188  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 00:37:44.189  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 00:37:44.190 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 00:37:44.190 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 00:37:44.191 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 00:37:44.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 00:37:44.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 00:37:44.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 00:37:44.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 00:37:44.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 00:37:44.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 00:37:44.299 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 00:37:44.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: c65b07cf13761105c1dac74034b4f6db2566eaefd451e7291f57788dc9a3fb780582433259fd13b9524fb0930eef07a81475633812232a9262160098f6865bbd863d0b5a42f2b547d01cce46813c6f46dadb4620d3dacb8db89a70d889647a015795e58b01fa28d9c66ce96e77c795e056e1bce697c8cb70b6152c58b4b6dbf7654c49e56831b8c7854c2627e8e8b002145ae2c3e5438e9603aad2801f3fbc1c29acbe8a0588cff37187c0dd9a198567396ebe70e2bb7cc2f3a50ea7209983d204c12e2120ac0920980903681dc3079acf8e76143b4f3e215e22d672e0463293afca3dcdefc6faf41e7f1ffa5f9719bd9d9d8013ccbf4c543c48d5b67b08cb9a24f60fb08dc482d1cc4a4ce61c69bbfd4471a79d0bbe803865427b43cee5c732aa8ce25a56431cee9594ab55cd2faba49f73e36ac8842241a6ef99691cb1ccc91e201095bd5025261c40fcaee60c116935a5ce71e54bb9db6f70fb86c09c727992c540aaf812624c3177d9045c8334c3ca912cb0dc1e22d1856aea20d6f56c0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:f4:1c:33:22:cc:0b:9c:29:de:f8:df:fc:1d:78:7d:c5:24:74:b3] modulus: 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 public exponent: 10001 ] 2021-09-24 04:38:51.398  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:38:51.401 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:38:51.404 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-24 04:38:51.405 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:38:51.406  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-24 04:38:51.407  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:38:51.407  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:38:51.407 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:38:51.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:38:51.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:38:51.414 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:38:51.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:38:51.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:38:51.485 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:38:51.717  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:38:51.782  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:38:51.784 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:38:51.784 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:38:51.788  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:38:51.789  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:38:51.790 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:38:51.791 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:38:51.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:38:51.793 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:38:51.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:38:51.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:38:51.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:38:51.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:38:51.797 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:38:51.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:38:51.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:aa:da:5a:c7:81:71:a0:ff:34:99:e7:10:7d:55:f0:3c:cf:b7:7d] modulus: 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 public exponent: 10001 ] 2021-09-24 04:40:47.757  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:40:47.758 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:40:47.759 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-24 04:40:47.760 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:40:47.762  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-24 04:40:47.763  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:40:47.763  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:40:47.763 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:40:47.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:40:47.764 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:40:47.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:40:47.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:40:47.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:40:47.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:40:47.882  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:40:47.883  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:40:47.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:40:47.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:40:47.888  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:40:47.888  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:40:47.889 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:40:47.890 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:40:47.890 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:40:47.891 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:40:47.891 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:40:47.891 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:40:47.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:40:47.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:40:47.893 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:40:47.893 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:40:47.896 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:75:93:80:d1:1a:0b:76:3c:b3:28:1b:5f:0b:1f:14:20:b8:fd:69] modulus: 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 public exponent: 10001 ] 2021-09-24 04:44:02.214  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:44:02.215 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:44:02.216 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-24 04:44:02.217 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:44:02.217  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-24 04:44:02.218  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:44:02.219  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:44:02.219 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:44:02.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:44:02.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:44:02.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:44:02.283 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:44:02.284 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:44:02.284 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:44:02.372  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:44:02.374  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:44:02.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:44:02.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:44:02.385  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:44:02.386  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:44:02.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:44:02.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:44:02.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:44:02.388 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:44:02.389 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:44:02.389 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:44:02.390 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:44:02.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:44:02.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:44:02.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:44:02.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:5e:f6:27:f7:ad:4e:35:b4:55:bf:e6:d3:40:42:9b:bf:2a:4b:29] modulus: b7b3adf327fd5a01f40d4d7913ec8781bf399f85838e522293354abe514b764099cfc5d0650d557064ae5309c0b8eaccbbd4c75853d2c41c7cae2a9f4baf7a716d6e284dd02fc5e9d59742b9a10d76b4cfcdd54f85d31bd254bfe998847fb67e0ebfffcb2e17deaa58ad1982cb06736a0e971d45693879bf90bfc960a7fb1a310fd79c9bc9592d1a009ccbb1299c49f69fc9f2f7c8667bddae900a3ef6f7606653129c1e731366b29abd69af06d306d98647c95bbbc73aeed9e8c9f44d2f068187c5036a628d8b5136e476a92eb6be28d5c90b7e9aa46f5b142a806811ed4c0782baae388b1d66f32dce1b36e2a08c076b21e47794bf318d4b01c15286945475 public exponent: 10001 ] 2021-09-24 04:44:06.871  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:44:06.873 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:44:06.874 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-24 04:44:06.874 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:44:06.875  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-24 04:44:06.875  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:44:06.875  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:44:06.876 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:44:06.876 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:44:06.876 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:44:06.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:44:06.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:44:06.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:44:06.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:44:06.983  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:44:06.984  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:44:06.984 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:44:06.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:44:06.987  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:44:06.987  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:44:06.988 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:44:06.988 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:44:06.989 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:44:06.989 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:44:06.990 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:44:06.990 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:44:06.992 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:44:06.992 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:44:06.992 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:44:06.993 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:44:06.995 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:6c:d0:38:f5:30:76:23:20:38:9f:ac:4a:6e:e6:0d:70:cd:a8:46] modulus: d1aa707d0d3b37b90000c7314a9c2fdba68596cad8ae0cba8bd0d0f8dbb757a7c1f14f7a0d9af4cd3261479e7f947ad17fc566693f5d70f79bbe574e7d178945acda71d620eb78e6f1776b09d49324fedf976c5c117b4e7748abfeee718dd1db1e8cda98033c47c2df6fff68b860387ab6a9498be450679b5f72875d13743fe4eeb025afe6b07957e7c28ad2d5e93586ff1976972de700b7ff1fedcb84057b5ade4cc3e09cdf91e29c2cac61bf442baf57b1a456ca71b8b39d547dd436ba75ebe33ec784efe8580986d036f6df6b93f8cc36623a721d91c5947762d985c01b32ea88a56342558888222de944aad2bc15e8211c48ac0b9366f13a1f1cc0758677 public exponent: 10001 ] 2021-09-24 04:44:38.641  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:44:38.642 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:44:38.643 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-24 04:44:38.644 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:44:38.644  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-24 04:44:38.644  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:44:38.645  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:44:38.645 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:44:38.645 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:44:38.646 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:44:38.650 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:44:38.650 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:44:38.650 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:44:38.650 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:44:38.768  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:44:38.769  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:44:38.769 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:44:38.770 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:44:38.787  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:44:38.788  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:44:38.788 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:44:38.789 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:44:38.789 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:44:38.790 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:44:38.790 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:44:38.791 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:44:38.791 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:44:38.791 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:44:38.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:44:38.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:44:38.795 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:e2:fb:ff:4b:2c:d1:6c:db:bd:99:ab:78:bc:07:96:54:24:c3:93] modulus: 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 public exponent: 10001 ] 2021-09-24 04:45:13.149  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:45:13.150 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:45:13.151 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-24 04:45:13.152 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:45:13.153  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-24 04:45:13.153  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:45:13.154  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:45:13.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:45:13.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:45:13.155 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:45:13.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:45:13.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:45:13.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:45:13.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:45:13.262  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:45:13.282  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:45:13.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:45:13.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:45:13.285  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:45:13.285  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:45:13.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:45:13.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:45:13.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:45:13.287 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:45:13.287 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:45:13.287 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:45:13.288 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:45:13.288 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:45:13.288 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:45:13.289 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:45:13.291 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: c65b07cf13761105c1dac74034b4f6db2566eaefd451e7291f57788dc9a3fb780582433259fd13b9524fb0930eef07a81475633812232a9262160098f6865bbd863d0b5a42f2b547d01cce46813c6f46dadb4620d3dacb8db89a70d889647a015795e58b01fa28d9c66ce96e77c795e056e1bce697c8cb70b6152c58b4b6dbf7654c49e56831b8c7854c2627e8e8b002145ae2c3e5438e9603aad2801f3fbc1c29acbe8a0588cff37187c0dd9a198567396ebe70e2bb7cc2f3a50ea7209983d204c12e2120ac0920980903681dc3079acf8e76143b4f3e215e22d672e0463293afca3dcdefc6faf41e7f1ffa5f9719bd9d9d8013ccbf4c543c48d5b67b08cb9a24f60fb08dc482d1cc4a4ce61c69bbfd4471a79d0bbe803865427b43cee5c732aa8ce25a56431cee9594ab55cd2faba49f73e36ac8842241a6ef99691cb1ccc91e201095bd5025261c40fcaee60c116935a5ce71e54bb9db6f70fb86c09c727992c540aaf812624c3177d9045c8334c3ca912cb0dc1e22d1856aea20d6f56c0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:8c:f3:55:6c:bb:98:51:d1:82:1d:fc:79:6b:1b:f8:96:d6:56:2c] modulus: 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 public exponent: 10001 ] 2021-09-24 04:46:12.990  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:46:12.992 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:46:12.994 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-24 04:46:12.994 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:46:12.995  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-24 04:46:12.995  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:46:12.995  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:46:12.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:46:12.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:46:12.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:46:13.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:46:13.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:46:13.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:46:13.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:46:13.071  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:46:13.072  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:46:13.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:46:13.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:46:13.083  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:46:13.083  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:46:13.084 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:46:13.084 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:46:13.085 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:46:13.085 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:46:13.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:46:13.087 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:46:13.088 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:46:13.088 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:46:13.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:46:13.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:46:13.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: c65b07cf13761105c1dac74034b4f6db2566eaefd451e7291f57788dc9a3fb780582433259fd13b9524fb0930eef07a81475633812232a9262160098f6865bbd863d0b5a42f2b547d01cce46813c6f46dadb4620d3dacb8db89a70d889647a015795e58b01fa28d9c66ce96e77c795e056e1bce697c8cb70b6152c58b4b6dbf7654c49e56831b8c7854c2627e8e8b002145ae2c3e5438e9603aad2801f3fbc1c29acbe8a0588cff37187c0dd9a198567396ebe70e2bb7cc2f3a50ea7209983d204c12e2120ac0920980903681dc3079acf8e76143b4f3e215e22d672e0463293afca3dcdefc6faf41e7f1ffa5f9719bd9d9d8013ccbf4c543c48d5b67b08cb9a24f60fb08dc482d1cc4a4ce61c69bbfd4471a79d0bbe803865427b43cee5c732aa8ce25a56431cee9594ab55cd2faba49f73e36ac8842241a6ef99691cb1ccc91e201095bd5025261c40fcaee60c116935a5ce71e54bb9db6f70fb86c09c727992c540aaf812624c3177d9045c8334c3ca912cb0dc1e22d1856aea20d6f56c0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:df:fc:bd:01:3a:ef:fa:88:51:dd:29:d5:c9:c8:67:d6:76:05:2c] modulus: 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 public exponent: 10001 ] 2021-09-24 04:46:57.601  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:46:57.603 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:46:57.603 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-24 04:46:57.604 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:46:57.604  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-24 04:46:57.604  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:46:57.605  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:46:57.605 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:46:57.605 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:46:57.605 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:46:57.610 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:46:57.611 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:46:57.611 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:46:57.611 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:46:57.756  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:46:57.757  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:46:57.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:46:57.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:46:57.784  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:46:57.785  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:46:57.785 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:46:57.786 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:46:57.786 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:46:57.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:46:57.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:46:57.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:46:57.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:46:57.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:46:57.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:46:57.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:46:57.793 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:4e:a6:20:73:5e:77:86:db:81:2b:17:2d:a5:3f:39:cd:be:ae:53] modulus: 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 public exponent: 10001 ] 2021-09-24 04:50:28.122  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:50:28.124 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:50:28.125 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-24 04:50:28.126 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:50:28.126  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-24 04:50:28.127  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:50:28.127  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:50:28.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:50:28.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:50:28.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:50:28.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:50:28.134 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:50:28.134 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:50:28.134 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:50:28.221  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:50:28.222  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:50:28.222 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:50:28.223 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:50:28.224  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:50:28.225  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:50:28.225 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:50:28.226 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:50:28.226 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:50:28.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:50:28.282 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:50:28.283 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:50:28.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:50:28.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:50:28.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:50:28.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:50:28.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:7f:0a:9d:9c:08:b1:e2:6a:d5:be:56:1b:75:ff:55:2a:12:a7:31] modulus: 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 public exponent: 10001 ] 2021-09-24 04:51:39.107  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:51:39.108 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:51:39.111 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-24 04:51:39.111 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:51:39.112  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-24 04:51:39.112  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:51:39.113  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:51:39.113 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:51:39.113 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:51:39.113 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:51:39.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:51:39.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:51:39.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:51:39.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:51:39.253  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:51:39.253  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:51:39.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:51:39.254 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:51:39.255  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:51:39.255  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:51:39.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:51:39.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:51:39.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:51:39.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:51:39.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:51:39.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:51:39.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:51:39.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:51:39.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:51:39.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:51:39.259 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: c65b07cf13761105c1dac74034b4f6db2566eaefd451e7291f57788dc9a3fb780582433259fd13b9524fb0930eef07a81475633812232a9262160098f6865bbd863d0b5a42f2b547d01cce46813c6f46dadb4620d3dacb8db89a70d889647a015795e58b01fa28d9c66ce96e77c795e056e1bce697c8cb70b6152c58b4b6dbf7654c49e56831b8c7854c2627e8e8b002145ae2c3e5438e9603aad2801f3fbc1c29acbe8a0588cff37187c0dd9a198567396ebe70e2bb7cc2f3a50ea7209983d204c12e2120ac0920980903681dc3079acf8e76143b4f3e215e22d672e0463293afca3dcdefc6faf41e7f1ffa5f9719bd9d9d8013ccbf4c543c48d5b67b08cb9a24f60fb08dc482d1cc4a4ce61c69bbfd4471a79d0bbe803865427b43cee5c732aa8ce25a56431cee9594ab55cd2faba49f73e36ac8842241a6ef99691cb1ccc91e201095bd5025261c40fcaee60c116935a5ce71e54bb9db6f70fb86c09c727992c540aaf812624c3177d9045c8334c3ca912cb0dc1e22d1856aea20d6f56c0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:8f:df:9f:c1:70:a5:8d:7c:67:5f:61:23:40:4e:b9:5a:6c:61:07] modulus: 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 public exponent: 10001 ] 2021-09-24 04:52:30.030  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:52:30.031 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:52:30.032 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-24 04:52:30.033 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:52:30.033  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-24 04:52:30.034  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:52:30.034  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:52:30.034 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:52:30.034 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:52:30.034 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:52:30.039 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:52:30.039 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:52:30.039 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:52:30.039 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:52:30.165  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:52:30.166  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:52:30.167 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:52:30.167 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:52:30.170  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:52:30.170  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:52:30.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:52:30.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:52:30.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:52:30.172 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:52:30.172 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:52:30.172 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:52:30.173 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:52:30.173 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:52:30.173 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:52:30.174 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:52:30.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: c65b07cf13761105c1dac74034b4f6db2566eaefd451e7291f57788dc9a3fb780582433259fd13b9524fb0930eef07a81475633812232a9262160098f6865bbd863d0b5a42f2b547d01cce46813c6f46dadb4620d3dacb8db89a70d889647a015795e58b01fa28d9c66ce96e77c795e056e1bce697c8cb70b6152c58b4b6dbf7654c49e56831b8c7854c2627e8e8b002145ae2c3e5438e9603aad2801f3fbc1c29acbe8a0588cff37187c0dd9a198567396ebe70e2bb7cc2f3a50ea7209983d204c12e2120ac0920980903681dc3079acf8e76143b4f3e215e22d672e0463293afca3dcdefc6faf41e7f1ffa5f9719bd9d9d8013ccbf4c543c48d5b67b08cb9a24f60fb08dc482d1cc4a4ce61c69bbfd4471a79d0bbe803865427b43cee5c732aa8ce25a56431cee9594ab55cd2faba49f73e36ac8842241a6ef99691cb1ccc91e201095bd5025261c40fcaee60c116935a5ce71e54bb9db6f70fb86c09c727992c540aaf812624c3177d9045c8334c3ca912cb0dc1e22d1856aea20d6f56c0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:fc:b5:0b:7a:3c:63:a3:77:fe:ca:b6:b4:09:53:7f:4a:4b:db:7d] modulus: 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 public exponent: 10001 ] 2021-09-24 04:53:12.380  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:53:12.381 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:53:12.383 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-24 04:53:12.384 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:53:12.385  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-24 04:53:12.386  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:53:12.387  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:53:12.387 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:53:12.387 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:53:12.387 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:53:12.392 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:53:12.392 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:53:12.393 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:53:12.393 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:53:12.471  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:53:12.471  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:53:12.472 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:53:12.473 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:53:12.475  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:53:12.475  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:53:12.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:53:12.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:53:12.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:53:12.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:53:12.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:53:12.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:53:12.478 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:53:12.478 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:53:12.482 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:53:12.483 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:53:12.485 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:e7:0d:73:b0:d2:78:7b:1b:f0:bf:89:5b:6b:9b:31:27:21:c2:af] modulus: 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 public exponent: 10001 ] 2021-09-24 04:55:21.418  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:55:21.419 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:55:21.421 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-24 04:55:21.421 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:55:21.421  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-24 04:55:21.422  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:55:21.422  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:55:21.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:55:21.423 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:55:21.423 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:55:21.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:55:21.427 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:55:21.428 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:55:21.428 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:55:21.568  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:55:21.568  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:55:21.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:55:21.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:55:21.571  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:55:21.571  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:55:21.571 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:55:21.571 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:55:21.572 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:55:21.572 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:55:21.573 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:55:21.573 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:55:21.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:55:21.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:55:21.582 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:55:21.583 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:55:21.585 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:ae:74:a9:af:47:91:fb:b0:8a:2e:e0:32:6f:57:73:b9:6a:aa:26] modulus: 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 public exponent: 10001 ] 2021-09-24 04:57:10.193  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:57:10.194 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:57:10.196 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-24 04:57:10.196 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:57:10.196  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-24 04:57:10.197  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:57:10.197  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:57:10.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:57:10.198 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:57:10.198 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:57:10.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:57:10.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:57:10.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:57:10.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:57:10.287  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:57:10.287  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:57:10.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:57:10.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:57:10.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:57:10.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:57:10.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:57:10.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:57:10.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:57:10.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:57:10.292 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:57:10.292 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:57:10.292 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:57:10.293 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:57:10.293 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:57:10.293 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:57:10.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:51:3d:ea:9e:9d:68:84:5a:7b:fa:6f:a8:a0:88:98:48:87:e9:05] modulus: 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 public exponent: 10001 ] 2021-09-24 04:58:27.606  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-24 04:58:27.607 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-24 04:58:27.608 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-24 04:58:27.609 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-24 04:58:27.609  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-24 04:58:27.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-24 04:58:27.610  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-24 04:58:27.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-24 04:58:27.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-24 04:58:27.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-24 04:58:27.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-24 04:58:27.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:58:27.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-24 04:58:27.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:58:27.783  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-24 04:58:27.784  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-24 04:58:27.784 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-24 04:58:27.785 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-24 04:58:27.786  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-24 04:58:27.787  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-24 04:58:27.787 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:58:27.787 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:58:27.788 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:58:27.788 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:58:27.789 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:58:27.789 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:58:27.790 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-24 04:58:27.790 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-24 04:58:27.790 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-24 04:58:27.791 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-24 04:58:27.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 190975821841666520390802923471533269516996392456 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 24 00:30:47 UTC 2021 Final Date: Wed Sep 24 00:30:46 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:d9:5d:56:7d:cf:94:25:f4:15:47:b6:0e:f4:5c:b4:28:71:58:b6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2bb6e15e21bae1aa03657d060b3bb010f375df9a 107cdc13bac505ee4519779eab5f1129ec16e7d5 b614e3338da51cdb2bfce594329ed28e34f86129 f3cc68b1701b53481a4d54cbde4da603a8e4c96e 2a0dd6686dd08bd0868f965484152e1dbb180124 58c76e0727d46af2cb50cb18786f82d8cd8de8df c50ec6ec89730b52c0ee1264abf2fe5fa8e13ce0 83e8746f56eaf3b7a962455872aacd920633235c 0f26ab51ffdd8440b399ca2ef955a618d56acd5d 647cf02b64fc1dcab8ffe8b283cdaad8dc93ecb2 fc0e2de612f17811c0007cccfb0565dfdd819b6f d86a9afaa53727bd3fdcf2a8b78effee9677f6e1 73beb9aa601c0e7569b4cb94a48eecb4ebe0c5ea 5cbcf45a5aaf0510d45a207c2d4cd6f011ffcde4 12c841f98a76dd179f9d0d151753b2c5df46616f c78ff3e5c3f0ea976f88d779ec3d92cae6195592 3c804a5c6ade84192803f0ebf3683c34f7317f23 b49e2d74d3358eb7fbaaf1f35c8eee46c0fc6bd2 307ad75b153498a9be1b89ebbd46628791876a8a 4c760296 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:42:81:47:4e:8e:9f:5c:08:af:94:c6:e0:e3:44:6b:43:08:af:4b] modulus: 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 public exponent: 10001 ]