2021-10-22 01:39:43,139 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-22 01:39:48,329 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-22 01:39:52.034  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-10-22 01:40:07.731 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-22 01:40:08.940  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-10-22 01:40:09.737  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-22 01:40:23.831  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 43.192 seconds (JVM running for 51.643) 2021-10-22 01:40:49.343  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 01:40:49.436 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 01:40:49.631 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-22 01:40:49.636 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 01:40:49.736  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-22 01:40:49.740  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 01:40:49.742  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 01:40:49.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 01:40:49.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 01:40:49.833 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 01:40:49.842 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 01:40:49.846 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 01:40:50.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 01:40:50.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 01:40:50.052 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 01:40:50.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 01:40:51.769  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 01:40:51.774  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 01:40:51.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 01:40:51.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 01:40:51.836  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 01:40:51.837  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 01:40:51.839 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 01:40:51.840 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 01:40:51.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 01:40:51.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 01:40:51.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 01:40:51.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 01:40:51.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 01:40:51.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 01:40:51.945 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 01:40:51.948 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 01:40:52.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:6d:fc:22:00:12:fc:fa:eb:de:6e:1c:04:40:f8:50:38:2b:ae:d4] modulus: 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 public exponent: 10001 ] 2021-10-22 03:07:54.544  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:07:54.546 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:07:54.548 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-22 03:07:54.550 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:07:54.551  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-22 03:07:54.552  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:07:54.552  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:07:54.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:07:54.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:07:54.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:07:54.645 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:07:54.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:07:54.647 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:07:54.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:07:55.020  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:07:55.021  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:07:55.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:07:55.022 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:07:55.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:07:55.025  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:07:55.026 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:07:55.026 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:07:55.027 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:07:55.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:07:55.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:07:55.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:07:55.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:07:55.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:07:55.031 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:07:55.032 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:07:55.038 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:88:0e:79:10:00:68:03:3c:f1:3b:bb:40:24:00:e2:29:43:6d:84] modulus: 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 public exponent: 10001 ] 2021-10-22 03:09:45.421  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:09:45.422 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:09:45.424 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-22 03:09:45.425 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:09:45.428  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-22 03:09:45.429  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:09:45.429  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:09:45.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:09:45.430 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:09:45.431 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:09:45.442 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:09:45.442 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:09:45.443 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:09:45.443 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:09:45.674  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:09:45.675  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:09:45.675 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:09:45.675 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:09:45.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:09:45.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:09:45.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:09:45.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:09:45.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:09:45.731 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:09:45.732 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:09:45.732 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:09:45.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:09:45.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:09:45.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:09:45.734 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:09:45.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:d3:20:e8:16:39:77:a1:a5:72:67:d3:e9:48:e0:93:30:36:ea:ba] modulus: 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 public exponent: 10001 ] 2021-10-22 03:12:38.464  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:12:38.466 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:12:38.467 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-22 03:12:38.468 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:12:38.468  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-22 03:12:38.469  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:12:38.470  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:12:38.470 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:12:38.470 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:12:38.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:12:38.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:12:38.534 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:12:38.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:12:38.535 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:12:38.693  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:12:38.694  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:12:38.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:12:38.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:12:38.729  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:12:38.730  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:12:38.730 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:12:38.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:12:38.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:12:38.732 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:12:38.732 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:12:38.733 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:12:38.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:12:38.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:12:38.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:12:38.737 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:12:38.741 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ea:c1:d9:2d:77:c4:6c:57:31:79:fc:b0:7e:4a:cf:62:91:fe:28:00] modulus: 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 public exponent: 10001 ] 2021-10-22 03:13:13.022  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:13:13.023 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:13:13.024 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-22 03:13:13.025 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:13:13.025  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-22 03:13:13.026  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:13:13.026  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:13:13.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:13:13.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:13:13.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:13:13.033 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:13:13.034 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:13:13.034 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:13:13.034 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:13:13.143  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:13:13.144  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:13:13.144 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:13:13.144 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:13:13.146  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:13:13.147  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:13:13.147 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:13:13.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:13:13.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:13:13.149 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:13:13.149 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:13:13.149 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:13:13.150 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:13:13.151 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:13:13.151 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:13:13.152 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:13:13.156 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:87:d5:17:01:c1:9b:9e:e4:5d:bd:2a:6b:d1:34:eb:22:de:1e:45] modulus: 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 public exponent: 10001 ] 2021-10-22 03:13:38.326  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:13:38.327 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:13:38.328 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-22 03:13:38.329 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:13:38.330  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-22 03:13:38.331  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:13:38.331  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:13:38.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:13:38.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:13:38.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:13:38.339 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:13:38.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:13:38.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:13:38.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:13:38.480  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:13:38.527  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:13:38.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:13:38.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:13:38.530  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:13:38.530  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:13:38.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:13:38.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:13:38.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:13:38.532 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:13:38.532 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:13:38.532 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:13:38.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:13:38.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:13:38.538 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:13:38.539 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:13:38.543 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6d:98:15:e5:d2:2a:b9:21:c1:90:58:3d:eb:41:cc:0b:48:7a:a7:13] modulus: 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 public exponent: 10001 ] 2021-10-22 03:13:53.434  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:13:53.436 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:13:53.437 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-22 03:13:53.438 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:13:53.449  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-22 03:13:53.450  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:13:53.451  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:13:53.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:13:53.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:13:53.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:13:53.530 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:13:53.530 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:13:53.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:13:53.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:13:53.686  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:13:53.687  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:13:53.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:13:53.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:13:53.698  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:13:53.706  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:13:53.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:13:53.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:13:53.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:13:53.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:13:53.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:13:53.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:13:53.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:13:53.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:13:53.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:13:53.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:13:53.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:77:dc:f8:81:12:a7:ac:3e:5d:e8:7e:cf:26:ab:56:e3:6a:4a:17] modulus: c95cd2f1fc33aac341675dd81978c500b7886de3a1201aae4b8d18791bb63c70107f6672a739a1d4e7d1e138e93473874fa5903dfe71e521d70da86c3ca97ae0ce5b2f263cc399c01d0f05ed24bd474b0430ee8ddf3360680dea4f5b918a77319a040656d1e45c0d946e394b4caf04bfbe9a694d4f3d600defc0f4e9b58b2f005c55e974c294f9d615a7cc79af472356e2e8db2ee3e236b2a7395877f1310c1fafc109a0d553c6824347b1f31765849e3a8f38239209eee36f70f29fca2b7514d81f65a05d819511e1bd26bdc96d95aa1328a40c1c2e039c6a85362322640790db177c11998d6607c1714d8caa6e21849a627b7ac6743fe1a5b7de2883eb56a1 public exponent: 10001 ] 2021-10-22 03:15:47.550  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:15:47.551 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:15:47.552 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-22 03:15:47.552 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:15:47.553  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-22 03:15:47.553  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:15:47.553  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:15:47.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:15:47.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:15:47.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:15:47.560 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:15:47.560 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:15:47.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:15:47.627 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:15:47.782  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:15:47.782  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:15:47.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:15:47.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:15:47.784  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:15:47.785  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:15:47.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:15:47.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:15:47.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:15:47.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:15:47.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:15:47.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:15:47.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:15:47.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:15:47.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:15:47.830 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:15:47.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:62:6e:b6:56:d0:d0:18:a9:69:27:08:d7:f7:58:8f:3b:7a:6a:85] modulus: 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 public exponent: 10001 ] 2021-10-22 03:17:15.602  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:17:15.603 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:17:15.604 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-22 03:17:15.605 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:17:15.605  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-22 03:17:15.606  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:17:15.606  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:17:15.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:17:15.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:17:15.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:17:15.611 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:17:15.611 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:17:15.612 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:17:15.612 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:17:15.735  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:17:15.736  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:17:15.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:17:15.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:17:15.738  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:17:15.738  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:17:15.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:17:15.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:17:15.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:17:15.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:17:15.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:17:15.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:17:15.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:17:15.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:17:15.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:17:15.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:17:15.746 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f7:ae:ee:b6:a0:e9:20:49:30:75:71:93:6f:ab:a1:cc:ad:38:08:18] modulus: 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 public exponent: 10001 ] 2021-10-22 03:18:48.500  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:18:48.502 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:18:48.504 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-22 03:18:48.505 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:18:48.505  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-22 03:18:48.506  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:18:48.506  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:18:48.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:18:48.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:18:48.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:18:48.513 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:18:48.514 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:18:48.515 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:18:48.515 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:18:48.679  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:18:48.680  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:18:48.681 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:18:48.681 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:18:48.682  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:18:48.683  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:18:48.683 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:18:48.683 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:18:48.684 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:18:48.685 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:18:48.685 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:18:48.685 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:18:48.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:18:48.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:18:48.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:18:48.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:18:48.692 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:d7:4e:48:92:56:87:dd:b8:fa:aa:39:9b:f4:5d:a7:47:7c:c4:ec] modulus: afce09f9285ab50633f229e1b11ddbe2a1969af17c7931783d5c84dd2df32b645c33f9950aec2984ff1631e60ded7dcbde179afd9de71b7b94712dd602bb76e30dd979c7cab2bfb22838d7317583a1ab49b4dd0caf83670a9fea37f960f16abdb72e36858d484cdb65ccfe8cde8368a84fa725b1f63d2a2d32a8410420090c04a565462b9e41070c70e0ca08f93e87e302f646dd68c8ba7a761fe93ed3d8f7f0d0260c7febb64e634aac2fdf21950a2c02db19800ac087fbfb71f20d1579b87c696777ef9cbf2c2fa3f7a80571daa8925b795051cbb68790ef7e7149fc7b8f2a28f47cf4d7649cb887e0ca00a6b2f76de7ab2a3c87b9a98b32be9725cac9a2bd public exponent: 10001 ] 2021-10-22 03:19:14.244  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:19:14.244 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:19:14.246 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-22 03:19:14.246 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:19:14.247  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-22 03:19:14.247  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:19:14.247  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:19:14.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:19:14.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:19:14.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:19:14.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:19:14.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:19:14.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:19:14.254 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:19:14.374  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:19:14.375  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:19:14.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:19:14.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:19:14.378  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:19:14.378  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:19:14.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:19:14.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:19:14.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:19:14.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:19:14.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:19:14.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:19:14.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:19:14.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:19:14.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:19:14.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:19:14.385 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:b9:e8:52:fb:4e:3f:c0:9c:07:9f:c4:8b:8d:5b:8f:c6:8d:d8:63] modulus: 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 public exponent: 10001 ] 2021-10-22 03:20:36.447  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:20:36.448 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:20:36.449 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-22 03:20:36.450 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:20:36.450  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-22 03:20:36.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:20:36.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:20:36.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:20:36.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:20:36.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:20:36.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:20:36.529 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:20:36.529 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:20:36.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:20:36.727  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:20:36.728  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:20:36.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:20:36.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:20:36.731  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:20:36.731  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:20:36.732 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:20:36.732 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:20:36.732 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:20:36.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:20:36.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:20:36.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:20:36.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:20:36.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:20:36.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:20:36.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:20:36.831 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:ba:f5:43:6b:c0:2d:37:66:07:73:f2:8f:06:df:c8:f4:15:7b:85] modulus: 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 public exponent: 10001 ] 2021-10-22 03:22:43.768  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:22:43.770 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:22:43.771 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-22 03:22:43.772 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:22:43.773  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-22 03:22:43.774  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:22:43.774  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:22:43.775 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:22:43.775 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:22:43.776 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:22:43.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:22:43.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:22:43.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:22:43.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:22:44.377  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:22:44.377  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:22:44.378 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:22:44.378 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:22:44.380  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:22:44.380  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:22:44.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:22:44.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:22:44.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:22:44.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:22:44.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:22:44.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:22:44.383 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:22:44.384 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:22:44.384 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:22:44.385 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:22:44.388 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:ea:d1:a9:bc:c5:48:32:d5:77:6e:72:af:3e:be:4b:4c:f9:58:08] modulus: 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 public exponent: 10001 ] 2021-10-22 03:24:15.850  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:24:15.851 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:24:15.852 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-22 03:24:15.853 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:24:15.853  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-22 03:24:15.854  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:24:15.854  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:24:15.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:24:15.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:24:15.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:24:15.860 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:24:15.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:24:15.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:24:15.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:24:15.980  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:24:15.980  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:24:15.980 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:24:15.981 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:24:15.982  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:24:15.982  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:24:15.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:24:15.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:24:15.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:24:15.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:24:15.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:24:15.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:24:15.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:24:15.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:24:15.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:24:15.986 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:24:15.989 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: c53ceaf945e0abe95be007f3b6527b85d631b8affae62f844de6b292dc035de2c3ddcc560f253a93441a6a56b2dba9764434f0993297bcd19f7221b187102ea101c331da1d060f2b325724a7621a7ba354153ab1c22faf3ac6e7c43907718570fcee6b3832106e052c607a07974a5d234aeb157ead4aa603363b168a1f1cee09d5ba71a6506e5e05bdf10d918ea5a74713b0ff2dfa9f62d12780cebc21e9009ed8af79d08af5789f5e69f34b10c7a37df8dff18daa4e00546a14b36c0a69a68f8c9e824f1690f33fc3eb5e219dd6bdb7bcb9b9c13dc45b62154f359db042e0ecea1a7adad224da78c9c4583cea191ef045d6d7f4c221e7b6104a28bcb3c81bf3e48f641082765b862993c2cbbbbd387dcd9fef10a81621d20ca24847594778d261347ba22aa5ee9cb6d65c5f266e7f3eeb004baf33db2c27ae00335e3b7683227e30a3588a9ebcc2aef22a132da8805c9aa1287954896d125f8767e7ed3c68345ea872cab290d7ae837b6990c73112ee8472126d69e52102e5f432477be79ec7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:b2:16:ff:74:fc:86:99:70:06:ca:23:01:74:94:80:ec:4e:34:79] modulus: afb1a04f602e8cf31a10f3abf955b67fdcf6ca8081279966625636c182d8c167ded1ff685b631651250c6929e6b5471c836abda238f0e8e0c8f3dcff17376b1155630a37cc953d32e9598952b5efce722681a5c6ad19c296d7f4724da97448615fa0f9168c9719e626102f57f862de55067f6e01773719458dbfd0ec253b4a035420ab8469d9d2209536fd6fac2f8b71d6bde5aa34282182cb3b8e23fdc3aac6e2ae5b6b7a843e396f917e31cc51625cc632f3964a942529b74b9f442f66ba61612daa6820612e8ee65bfd3e6edce5e9460cce60318903404af135cb4661a16bad669e1f2574a375144ebebad3716c7c5208bdd881a31a194319c993eaed338f public exponent: 10001 ] 2021-10-22 03:26:15.961  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-22 03:26:15.962 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-22 03:26:15.964 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-22 03:26:15.964 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-22 03:26:15.965  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-22 03:26:15.965  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-22 03:26:15.965  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-22 03:26:15.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-22 03:26:15.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-22 03:26:15.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-22 03:26:15.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-22 03:26:15.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:26:15.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-22 03:26:15.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:26:16.133  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-22 03:26:16.134  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-22 03:26:16.134 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-22 03:26:16.134 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-22 03:26:16.135  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-22 03:26:16.135  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-22 03:26:16.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:26:16.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:26:16.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:26:16.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:26:16.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:26:16.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:26:16.137 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-22 03:26:16.137 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-22 03:26:16.137 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-22 03:26:16.137 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-22 03:26:16.140 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 707186278042743011590563044444284860307289820840 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Oct 22 01:35:04 UTC 2021 Final Date: Wed Oct 22 01:35:03 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bf:e9:e8:38:d2:a4:c1:64:4d:cb:c0:82:5c:81:8d:9c:e0:0d:4a:db] modulus: c53ceaf945e0abe95be007f3b6527b85d631b8affae62f844de6b292dc035de2c3ddcc560f253a93441a6a56b2dba9764434f0993297bcd19f7221b187102ea101c331da1d060f2b325724a7621a7ba354153ab1c22faf3ac6e7c43907718570fcee6b3832106e052c607a07974a5d234aeb157ead4aa603363b168a1f1cee09d5ba71a6506e5e05bdf10d918ea5a74713b0ff2dfa9f62d12780cebc21e9009ed8af79d08af5789f5e69f34b10c7a37df8dff18daa4e00546a14b36c0a69a68f8c9e824f1690f33fc3eb5e219dd6bdb7bcb9b9c13dc45b62154f359db042e0ecea1a7adad224da78c9c4583cea191ef045d6d7f4c221e7b6104a28bcb3c81bf3e48f641082765b862993c2cbbbbd387dcd9fef10a81621d20ca24847594778d261347ba22aa5ee9cb6d65c5f266e7f3eeb004baf33db2c27ae00335e3b7683227e30a3588a9ebcc2aef22a132da8805c9aa1287954896d125f8767e7ed3c68345ea872cab290d7ae837b6990c73112ee8472126d69e52102e5f432477be79ec7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 30c7e888ce9212398694dbe34f47714979195a69 d6d0620360eed23ddea11a4417921a1c8e9d2bc7 52c23a73d7103312c11c93ee6fe6e3ef7f0ecc0f e55e65429a7ffe72bd0ede949e966f875490d2fa 57b3e9c54300216eb307068106f884c288d0d42d 87244376a0569e2b370fec562fae4f1d610e1f52 90e9fca2f8a40f37624118571da6c1ec89e8285e 0540ce8269abc565e27fc5c33b277c1c7e337c98 2cb19275da10ea90a7d1b881d3b61d46761d0ab5 00ff5da5a863515816acda19cb86914e5b6f4f86 dccc4a350d32f8934a692b4ff9ae70f91a5ed327 a09050126008261459f786ea25faf86e86aeff34 631523f3c97506bbaceef4955ca885bad9d44177 a0d0fa4a3e1834353159f990ef25d88aa3952187 43d41968c586337ed3e32bd817d2fac757f14140 25c859ad5cb2b21be8a0b5ec9b8eda916876b883 1fdeec5bf48fa28784f35fd6aeea20ef03001474 d8aa4ee1e7ec6b9bfc00648c1297cada0ac4d8c3 c636a5b7098445ca0f3a3c1de3448d54dd631d15 250c6ef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:3e:90:32:ff:c3:6b:e7:b6:db:a6:a4:8c:55:91:59:e5:de:71:f6] modulus: 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 public exponent: 10001 ]