2021-10-12 01:56:42,646 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-12 01:56:46,848 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-12 01:56:50.232  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-10-12 01:57:04.845 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-12 01:57:05.949  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-10-12 01:57:06.642  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-12 01:57:20.349  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 40.112 seconds (JVM running for 47.884) 2021-10-12 01:58:48.649  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-12 01:58:48.740 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-12 01:58:48.847 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-12 01:58:48.852 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-12 01:58:48.944  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-12 01:58:48.948  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-12 01:58:48.949  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-12 01:58:49.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-12 01:58:49.035 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 01:58:49.041 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-12 01:58:49.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-12 01:58:49.055 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-12 01:58:49.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-12 01:58:49.335 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 01:58:49.337 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 01:58:49.341 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 01:58:50.741  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-12 01:58:50.745  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-12 01:58:50.745 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-12 01:58:50.748 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 01:58:50.837  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-12 01:58:50.839  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-12 01:58:50.840 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 01:58:50.840 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 01:58:50.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 01:58:50.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 01:58:50.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 01:58:50.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 01:58:51.038 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 01:58:51.038 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 01:58:51.039 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 01:58:51.041 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-12 01:58:51.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 368988493249624088785983600940577640191748875041 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 12 01:51:35 UTC 2021 Final Date: Sun Oct 12 01:51:34 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:a6:d4:2e:98:02:e2:a5:2d:f7:68:2f:db:ef:7b:de:8b:3b:db:66] modulus: cc81589f9c9805d721ddf70cb9a57d94aa317ebe52584934086bff75e143312c8e3f87517f222f29e636d5e85ceb37f2df1a5ed81b0efdf2efecca079967951b20732a525b2b5d644128d05ec05de3c9319206ec91b11547b56e00931c0ac1316a100be411122650ed6b148e1a14e1c0f0e81ba97e8cdab9fc57cdc234a549e311f2290d55610b28f5ac00d5149eda45145e232df4a866a2d2e3701c44ad0c1f0117b521016cda4cc0ca39d686d579f6ca46b438a8f628d16251351a64aba4f3682728e5036abe98761ac6010d4f5a5e8663d57465cf9b9a3ce31103555a6d6c16e24f9a1e66cd198c443d9341dca9872324587bfd36260b027707c3bea9c356da5defc5829123c2cc4acad47621759edcef6b1481a9f13f46dc73622792520c3b62bdaebaa5d29cbad388f63bae471857f512f8cc40d8c509af0c3b29e075b5bab2b91f646c18e7deeb8dbe5b5e290980b226a11fd3e4ed63733464f29a78de1176de4a6063d5bbf1d81cca9284c0d560cc393a47ee0f9b945afbd2152732dd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89b41503f16499c8c8a12bc6a0720ce2383bedf4 3b55474378a7b994a0b98a58ce694d182c767070 8f4616615cb40959fcd3588c5f62d42b17ea4aa9 919ca91d6d76945ca5a670e7c186eab3c0b8803d 6192d651981901737b52f7ac345c0a7179acb1aa 28e267a962d578222aefab49826aee5e80507eeb a6bc1c411951528923907a8b97719f214493dab2 4a7d72e15779a62a1e5ce3b4025950340f90e86e 444e7c3626a7e71c2956db8353afefa3022d93ca deff459058621987d2e5be3b690ae532c40c8b66 4ca1e2948d5d81a699248f10a558512faaf9028d 6ebadee0d7a55a215d7a435275fbf310f698c8fa 4945a432ff947483f3bf8355facf7f9b73b8e4ef 1b5cfe42ba174bd631f65476574b551073092e48 067d225004c7ad571f0750da6ca5e7a0e7c98a9e 2347f455a44c84f2df9d044c886c5fc3380d6021 d8f49bbd3ea469e3ae7b1e5190afe61fc3a03f7d 99df8524bee98125f3ea864c1c444ed96c734345 5150b46a4043d3b96e2ee5e29e128f1447e5e5ae a2a8cccb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:ac:7a:78:92:7a:e1:0b:62:19:6d:b5:cd:ae:90:e1:e5:d2:eb:dc] modulus: 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 public exponent: 10001 ] 2021-10-12 05:05:08.677  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-12 05:05:08.679 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-12 05:05:08.682 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-12 05:05:08.683 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-12 05:05:08.684  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-12 05:05:08.684  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-12 05:05:08.685  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-12 05:05:08.685 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-12 05:05:08.686 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-12 05:05:08.686 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-12 05:05:08.733 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-12 05:05:08.735 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:05:08.735 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:05:08.735 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:05:08.967  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-12 05:05:08.968  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-12 05:05:08.968 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-12 05:05:08.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:05:08.972  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-12 05:05:08.973  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-12 05:05:08.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:05:08.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:05:08.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:05:08.975 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:05:08.975 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:05:08.976 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:05:08.976 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:05:08.977 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:05:08.977 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:05:08.978 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-12 05:05:08.983 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 368988493249624088785983600940577640191748875041 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 12 01:51:35 UTC 2021 Final Date: Sun Oct 12 01:51:34 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:a6:d4:2e:98:02:e2:a5:2d:f7:68:2f:db:ef:7b:de:8b:3b:db:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89b41503f16499c8c8a12bc6a0720ce2383bedf4 3b55474378a7b994a0b98a58ce694d182c767070 8f4616615cb40959fcd3588c5f62d42b17ea4aa9 919ca91d6d76945ca5a670e7c186eab3c0b8803d 6192d651981901737b52f7ac345c0a7179acb1aa 28e267a962d578222aefab49826aee5e80507eeb a6bc1c411951528923907a8b97719f214493dab2 4a7d72e15779a62a1e5ce3b4025950340f90e86e 444e7c3626a7e71c2956db8353afefa3022d93ca deff459058621987d2e5be3b690ae532c40c8b66 4ca1e2948d5d81a699248f10a558512faaf9028d 6ebadee0d7a55a215d7a435275fbf310f698c8fa 4945a432ff947483f3bf8355facf7f9b73b8e4ef 1b5cfe42ba174bd631f65476574b551073092e48 067d225004c7ad571f0750da6ca5e7a0e7c98a9e 2347f455a44c84f2df9d044c886c5fc3380d6021 d8f49bbd3ea469e3ae7b1e5190afe61fc3a03f7d 99df8524bee98125f3ea864c1c444ed96c734345 5150b46a4043d3b96e2ee5e29e128f1447e5e5ae a2a8cccb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:3d:43:fb:9c:6d:da:6e:29:2a:ce:6b:e9:1f:9e:f7:94:77:52:2a] modulus: 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 public exponent: 10001 ] 2021-10-12 05:07:04.361  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-12 05:07:04.363 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-12 05:07:04.365 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-12 05:07:04.366 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-12 05:07:04.368  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-12 05:07:04.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-12 05:07:04.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-12 05:07:04.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-12 05:07:04.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-12 05:07:04.433 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-12 05:07:04.446 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-12 05:07:04.447 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:07:04.447 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:07:04.447 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:07:04.639  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-12 05:07:04.640  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-12 05:07:04.641 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-12 05:07:04.641 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:07:04.643  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-12 05:07:04.644  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-12 05:07:04.644 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:07:04.645 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:07:04.645 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:07:04.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:07:04.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:07:04.646 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:07:04.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:07:04.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:07:04.648 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:07:04.649 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-12 05:07:04.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 368988493249624088785983600940577640191748875041 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 12 01:51:35 UTC 2021 Final Date: Sun Oct 12 01:51:34 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:a6:d4:2e:98:02:e2:a5:2d:f7:68:2f:db:ef:7b:de:8b:3b:db:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89b41503f16499c8c8a12bc6a0720ce2383bedf4 3b55474378a7b994a0b98a58ce694d182c767070 8f4616615cb40959fcd3588c5f62d42b17ea4aa9 919ca91d6d76945ca5a670e7c186eab3c0b8803d 6192d651981901737b52f7ac345c0a7179acb1aa 28e267a962d578222aefab49826aee5e80507eeb a6bc1c411951528923907a8b97719f214493dab2 4a7d72e15779a62a1e5ce3b4025950340f90e86e 444e7c3626a7e71c2956db8353afefa3022d93ca deff459058621987d2e5be3b690ae532c40c8b66 4ca1e2948d5d81a699248f10a558512faaf9028d 6ebadee0d7a55a215d7a435275fbf310f698c8fa 4945a432ff947483f3bf8355facf7f9b73b8e4ef 1b5cfe42ba174bd631f65476574b551073092e48 067d225004c7ad571f0750da6ca5e7a0e7c98a9e 2347f455a44c84f2df9d044c886c5fc3380d6021 d8f49bbd3ea469e3ae7b1e5190afe61fc3a03f7d 99df8524bee98125f3ea864c1c444ed96c734345 5150b46a4043d3b96e2ee5e29e128f1447e5e5ae a2a8cccb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:3d:59:5d:98:f5:ba:55:bc:9e:74:d6:8c:dd:76:82:6f:62:c7:98] modulus: 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 public exponent: 10001 ] 2021-10-12 05:10:15.269  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-12 05:10:15.269 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-12 05:10:15.271 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-12 05:10:15.271 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-12 05:10:15.272  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-12 05:10:15.272  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-12 05:10:15.273  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-12 05:10:15.273 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-12 05:10:15.273 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-12 05:10:15.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-12 05:10:15.279 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-12 05:10:15.279 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:10:15.279 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:10:15.280 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:10:15.432  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-12 05:10:15.433  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-12 05:10:15.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-12 05:10:15.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:10:15.437  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-12 05:10:15.437  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-12 05:10:15.438 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:10:15.439 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:10:15.439 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:10:15.440 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:10:15.440 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:10:15.440 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:10:15.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:10:15.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:10:15.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:10:15.443 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-12 05:10:15.446 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 368988493249624088785983600940577640191748875041 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 12 01:51:35 UTC 2021 Final Date: Sun Oct 12 01:51:34 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:a6:d4:2e:98:02:e2:a5:2d:f7:68:2f:db:ef:7b:de:8b:3b:db:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89b41503f16499c8c8a12bc6a0720ce2383bedf4 3b55474378a7b994a0b98a58ce694d182c767070 8f4616615cb40959fcd3588c5f62d42b17ea4aa9 919ca91d6d76945ca5a670e7c186eab3c0b8803d 6192d651981901737b52f7ac345c0a7179acb1aa 28e267a962d578222aefab49826aee5e80507eeb a6bc1c411951528923907a8b97719f214493dab2 4a7d72e15779a62a1e5ce3b4025950340f90e86e 444e7c3626a7e71c2956db8353afefa3022d93ca deff459058621987d2e5be3b690ae532c40c8b66 4ca1e2948d5d81a699248f10a558512faaf9028d 6ebadee0d7a55a215d7a435275fbf310f698c8fa 4945a432ff947483f3bf8355facf7f9b73b8e4ef 1b5cfe42ba174bd631f65476574b551073092e48 067d225004c7ad571f0750da6ca5e7a0e7c98a9e 2347f455a44c84f2df9d044c886c5fc3380d6021 d8f49bbd3ea469e3ae7b1e5190afe61fc3a03f7d 99df8524bee98125f3ea864c1c444ed96c734345 5150b46a4043d3b96e2ee5e29e128f1447e5e5ae a2a8cccb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:be:9e:b3:28:2e:e2:d3:04:3f:82:06:a9:82:95:58:24:81:d7:39] modulus: b2e90ba44b881f73249b4d17791047cad495744963858519bf3d0eca515b3184d27b7a193fa201af34b0df9f265a87d28efa17287e36154e025264c6346b26f099727d9646ee153edec1d0940b6e68220440edd589b2180c3e4e14615f3bd2f26f6b8cf87e5940689a7a1663f9c97b19d7e93127fe8cae52635aaf3d52ca36564629c5107d0e2daf90ba26447d2ec4bf34301012494518b2318ef6fdcaafe1af86c16526a94b5453543ccdde19c114c255e8bf0f9c6c40c3f76e943968a2f0b631a0274e3795a050c8e57ff2513f93416051b98f5235488505a3fa5599e4d67093c56635fffd54b6248d9c9523ee5eb46ee5b63d0622f730e96ef6a04586e51d public exponent: 10001 ] 2021-10-12 05:10:33.571  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-12 05:10:33.572 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-12 05:10:33.574 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-12 05:10:33.575 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-12 05:10:33.575  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-12 05:10:33.576  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-12 05:10:33.576  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-12 05:10:33.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-12 05:10:33.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-12 05:10:33.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-12 05:10:33.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-12 05:10:33.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:10:33.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:10:33.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:10:33.724  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-12 05:10:33.725  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-12 05:10:33.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-12 05:10:33.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:10:33.733  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-12 05:10:33.733  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-12 05:10:33.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:10:33.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:10:33.735 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:10:33.735 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:10:33.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:10:33.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:10:33.737 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:10:33.737 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:10:33.738 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:10:33.739 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-12 05:10:33.743 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 368988493249624088785983600940577640191748875041 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 12 01:51:35 UTC 2021 Final Date: Sun Oct 12 01:51:34 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:a6:d4:2e:98:02:e2:a5:2d:f7:68:2f:db:ef:7b:de:8b:3b:db:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89b41503f16499c8c8a12bc6a0720ce2383bedf4 3b55474378a7b994a0b98a58ce694d182c767070 8f4616615cb40959fcd3588c5f62d42b17ea4aa9 919ca91d6d76945ca5a670e7c186eab3c0b8803d 6192d651981901737b52f7ac345c0a7179acb1aa 28e267a962d578222aefab49826aee5e80507eeb a6bc1c411951528923907a8b97719f214493dab2 4a7d72e15779a62a1e5ce3b4025950340f90e86e 444e7c3626a7e71c2956db8353afefa3022d93ca deff459058621987d2e5be3b690ae532c40c8b66 4ca1e2948d5d81a699248f10a558512faaf9028d 6ebadee0d7a55a215d7a435275fbf310f698c8fa 4945a432ff947483f3bf8355facf7f9b73b8e4ef 1b5cfe42ba174bd631f65476574b551073092e48 067d225004c7ad571f0750da6ca5e7a0e7c98a9e 2347f455a44c84f2df9d044c886c5fc3380d6021 d8f49bbd3ea469e3ae7b1e5190afe61fc3a03f7d 99df8524bee98125f3ea864c1c444ed96c734345 5150b46a4043d3b96e2ee5e29e128f1447e5e5ae a2a8cccb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:f9:cc:4d:fe:e7:08:98:7d:23:38:a3:fc:ed:7e:b1:05:fe:db:7d] modulus: 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 public exponent: 10001 ] 2021-10-12 05:10:47.509  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-12 05:10:47.511 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-12 05:10:47.512 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-12 05:10:47.512 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-12 05:10:47.513  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-12 05:10:47.513  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-12 05:10:47.514  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-12 05:10:47.514 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-12 05:10:47.514 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-12 05:10:47.515 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-12 05:10:47.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-12 05:10:47.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:10:47.534 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:10:47.534 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:10:47.637  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-12 05:10:47.638  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-12 05:10:47.638 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-12 05:10:47.639 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:10:47.641  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-12 05:10:47.641  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-12 05:10:47.642 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:10:47.642 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:10:47.643 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:10:47.644 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:10:47.644 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:10:47.645 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:10:47.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:10:47.646 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:10:47.647 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:10:47.648 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-12 05:10:47.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 368988493249624088785983600940577640191748875041 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 12 01:51:35 UTC 2021 Final Date: Sun Oct 12 01:51:34 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:a6:d4:2e:98:02:e2:a5:2d:f7:68:2f:db:ef:7b:de:8b:3b:db:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89b41503f16499c8c8a12bc6a0720ce2383bedf4 3b55474378a7b994a0b98a58ce694d182c767070 8f4616615cb40959fcd3588c5f62d42b17ea4aa9 919ca91d6d76945ca5a670e7c186eab3c0b8803d 6192d651981901737b52f7ac345c0a7179acb1aa 28e267a962d578222aefab49826aee5e80507eeb a6bc1c411951528923907a8b97719f214493dab2 4a7d72e15779a62a1e5ce3b4025950340f90e86e 444e7c3626a7e71c2956db8353afefa3022d93ca deff459058621987d2e5be3b690ae532c40c8b66 4ca1e2948d5d81a699248f10a558512faaf9028d 6ebadee0d7a55a215d7a435275fbf310f698c8fa 4945a432ff947483f3bf8355facf7f9b73b8e4ef 1b5cfe42ba174bd631f65476574b551073092e48 067d225004c7ad571f0750da6ca5e7a0e7c98a9e 2347f455a44c84f2df9d044c886c5fc3380d6021 d8f49bbd3ea469e3ae7b1e5190afe61fc3a03f7d 99df8524bee98125f3ea864c1c444ed96c734345 5150b46a4043d3b96e2ee5e29e128f1447e5e5ae a2a8cccb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:66:82:0d:f3:7d:a2:d4:01:42:00:de:ab:94:f7:22:1e:db:5e:1a] modulus: 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 public exponent: 10001 ] 2021-10-12 05:11:22.062  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-12 05:11:22.063 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-12 05:11:22.064 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-12 05:11:22.064 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-12 05:11:22.065  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-12 05:11:22.065  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-12 05:11:22.065  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-12 05:11:22.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-12 05:11:22.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-12 05:11:22.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-12 05:11:22.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-12 05:11:22.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:11:22.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:11:22.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:11:22.228  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-12 05:11:22.229  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-12 05:11:22.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-12 05:11:22.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:11:22.231  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-12 05:11:22.232  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-12 05:11:22.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:11:22.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:11:22.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:11:22.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:11:22.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:11:22.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:11:22.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:11:22.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:11:22.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:11:22.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-12 05:11:22.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 368988493249624088785983600940577640191748875041 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 12 01:51:35 UTC 2021 Final Date: Sun Oct 12 01:51:34 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:a6:d4:2e:98:02:e2:a5:2d:f7:68:2f:db:ef:7b:de:8b:3b:db:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89b41503f16499c8c8a12bc6a0720ce2383bedf4 3b55474378a7b994a0b98a58ce694d182c767070 8f4616615cb40959fcd3588c5f62d42b17ea4aa9 919ca91d6d76945ca5a670e7c186eab3c0b8803d 6192d651981901737b52f7ac345c0a7179acb1aa 28e267a962d578222aefab49826aee5e80507eeb a6bc1c411951528923907a8b97719f214493dab2 4a7d72e15779a62a1e5ce3b4025950340f90e86e 444e7c3626a7e71c2956db8353afefa3022d93ca deff459058621987d2e5be3b690ae532c40c8b66 4ca1e2948d5d81a699248f10a558512faaf9028d 6ebadee0d7a55a215d7a435275fbf310f698c8fa 4945a432ff947483f3bf8355facf7f9b73b8e4ef 1b5cfe42ba174bd631f65476574b551073092e48 067d225004c7ad571f0750da6ca5e7a0e7c98a9e 2347f455a44c84f2df9d044c886c5fc3380d6021 d8f49bbd3ea469e3ae7b1e5190afe61fc3a03f7d 99df8524bee98125f3ea864c1c444ed96c734345 5150b46a4043d3b96e2ee5e29e128f1447e5e5ae a2a8cccb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:b4:e1:95:87:66:f3:7f:44:d2:7d:78:51:18:ae:1b:e2:a3:b1:b7] modulus: a8a96153cb759e376b5fd057583259724851f4df51b5d6956de35362b8dfac71c6c2582cc156e9b7b9804b0ef49f108d9eec1f043b78a4e93c4cf3fcf8df04f5c024f20beb42d2e2fafc0f215d2b0c0768efcb1fe1d20e7a22fb1e2afc166b88252a4c76b9eb3cb071d9917805a812183940998f7bc3a634d1df3e81c31c4021d86871ac385118ba3f2edb424fe6dc2689ba45dac517b7ba1cc98c342ee08ef5e987186435ca4643b532fe6098c1b55a068f5682eb129dec69502569d70a7a563e07014310139c83a1344e2eaf50f672c23c8f99ccae292f4d081c59e9da9d13c5b0f6a1453bb7d14f1d0b44490885197d223ec0533e5e9a0c40f9f89ad41e91 public exponent: 10001 ] 2021-10-12 05:12:48.981  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-12 05:12:48.983 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-12 05:12:48.984 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-12 05:12:48.985 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-12 05:12:48.985  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-12 05:12:48.986  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-12 05:12:48.986  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-12 05:12:48.986 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-12 05:12:48.987 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-12 05:12:48.987 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-12 05:12:48.992 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-12 05:12:48.993 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:12:48.993 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:12:48.993 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:12:49.131  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-12 05:12:49.132  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-12 05:12:49.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-12 05:12:49.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:12:49.134  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-12 05:12:49.134  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-12 05:12:49.135 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:12:49.135 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:12:49.135 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:12:49.136 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:12:49.136 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:12:49.136 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:12:49.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:12:49.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:12:49.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:12:49.138 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-12 05:12:49.142 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 368988493249624088785983600940577640191748875041 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 12 01:51:35 UTC 2021 Final Date: Sun Oct 12 01:51:34 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:a6:d4:2e:98:02:e2:a5:2d:f7:68:2f:db:ef:7b:de:8b:3b:db:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89b41503f16499c8c8a12bc6a0720ce2383bedf4 3b55474378a7b994a0b98a58ce694d182c767070 8f4616615cb40959fcd3588c5f62d42b17ea4aa9 919ca91d6d76945ca5a670e7c186eab3c0b8803d 6192d651981901737b52f7ac345c0a7179acb1aa 28e267a962d578222aefab49826aee5e80507eeb a6bc1c411951528923907a8b97719f214493dab2 4a7d72e15779a62a1e5ce3b4025950340f90e86e 444e7c3626a7e71c2956db8353afefa3022d93ca deff459058621987d2e5be3b690ae532c40c8b66 4ca1e2948d5d81a699248f10a558512faaf9028d 6ebadee0d7a55a215d7a435275fbf310f698c8fa 4945a432ff947483f3bf8355facf7f9b73b8e4ef 1b5cfe42ba174bd631f65476574b551073092e48 067d225004c7ad571f0750da6ca5e7a0e7c98a9e 2347f455a44c84f2df9d044c886c5fc3380d6021 d8f49bbd3ea469e3ae7b1e5190afe61fc3a03f7d 99df8524bee98125f3ea864c1c444ed96c734345 5150b46a4043d3b96e2ee5e29e128f1447e5e5ae a2a8cccb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:38:9b:d6:2f:1f:4f:3b:fa:b2:06:9b:c8:9c:63:0f:d2:8a:95:56] modulus: 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 public exponent: 10001 ] 2021-10-12 05:13:06.153  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-12 05:13:06.155 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-12 05:13:06.156 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-12 05:13:06.157 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-12 05:13:06.157  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-12 05:13:06.158  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-12 05:13:06.158  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-12 05:13:06.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-12 05:13:06.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-12 05:13:06.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-12 05:13:06.164 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-12 05:13:06.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:13:06.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-12 05:13:06.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:13:06.316  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-12 05:13:06.331  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-12 05:13:06.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-12 05:13:06.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-12 05:13:06.333  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-12 05:13:06.333  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-12 05:13:06.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:13:06.334 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:13:06.334 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:13:06.335 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:13:06.335 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:13:06.335 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:13:06.336 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-12 05:13:06.336 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-12 05:13:06.336 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-12 05:13:06.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-12 05:13:06.339 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 368988493249624088785983600940577640191748875041 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 12 01:51:35 UTC 2021 Final Date: Sun Oct 12 01:51:34 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:a6:d4:2e:98:02:e2:a5:2d:f7:68:2f:db:ef:7b:de:8b:3b:db:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 89b41503f16499c8c8a12bc6a0720ce2383bedf4 3b55474378a7b994a0b98a58ce694d182c767070 8f4616615cb40959fcd3588c5f62d42b17ea4aa9 919ca91d6d76945ca5a670e7c186eab3c0b8803d 6192d651981901737b52f7ac345c0a7179acb1aa 28e267a962d578222aefab49826aee5e80507eeb a6bc1c411951528923907a8b97719f214493dab2 4a7d72e15779a62a1e5ce3b4025950340f90e86e 444e7c3626a7e71c2956db8353afefa3022d93ca deff459058621987d2e5be3b690ae532c40c8b66 4ca1e2948d5d81a699248f10a558512faaf9028d 6ebadee0d7a55a215d7a435275fbf310f698c8fa 4945a432ff947483f3bf8355facf7f9b73b8e4ef 1b5cfe42ba174bd631f65476574b551073092e48 067d225004c7ad571f0750da6ca5e7a0e7c98a9e 2347f455a44c84f2df9d044c886c5fc3380d6021 d8f49bbd3ea469e3ae7b1e5190afe61fc3a03f7d 99df8524bee98125f3ea864c1c444ed96c734345 5150b46a4043d3b96e2ee5e29e128f1447e5e5ae a2a8cccb Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:86:5d:f2:b0:90:f1:8e:d7:1f:8a:22:87:77:bc:a2:31:1f:2f:00] modulus: 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 public exponent: 10001 ]