2021-10-30 01:39:36,342 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-10-30 01:39:40,743 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-10-30 01:39:43.549  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-10-30 01:39:57.549 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-10-30 01:39:59.045  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-10-30 01:39:59.739  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-10-30 01:40:12.644  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 38.797 seconds (JVM running for 46.589) 2021-10-30 01:40:56.338  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-30 01:40:56.345 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-30 01:40:56.536 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-30 01:40:56.539 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-30 01:40:56.548  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-10-30 01:40:56.632  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-30 01:40:56.634  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-30 01:40:56.638 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-30 01:40:56.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 01:40:56.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-30 01:40:56.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-30 01:40:56.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-30 01:40:56.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-30 01:40:56.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 01:40:56.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 01:40:56.936 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 01:40:58.374  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-30 01:40:58.377  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-30 01:40:58.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-30 01:40:58.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 01:40:58.385  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-30 01:40:58.386  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-30 01:40:58.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 01:40:58.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 01:40:58.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 01:40:58.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 01:40:58.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 01:40:58.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 01:40:58.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 01:40:58.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 01:40:58.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 01:40:58.533 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-30 01:40:58.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 596874060364761968481743603990132320816506150629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 30 01:36:01 UTC 2021 Final Date: Thu Oct 30 01:36:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6 dd655376fc4fdc7e9c9c7441256e04c908bcdd24 9d62396f1318bacca223b71a5dd888ae34fccbb3 4249f78b7d8115eb5604ef091bc4f68bc14834c2 7b1e8386388baf06500fa6c15c0b8bade94d0024 31098c947e5e9f7bb4603d895003e40b8e140745 a2557376461d033a012cc38716c8e824b25beb91 bb3cd4c8cb214042ecbbf52cc7011236bff99deb c33b481fcdd456805cbd7f68cb26439d5592253b dd8a42dacfb5ad2ba702cf182defef5f0dd82995 0ec05c8bf4b2821fc67eb8b75159fda86a304f92 ca04f97261510ca3002680058b68d8d890df63cd e9c5c10701c3e2a7fb319f56d54060d5e79cc775 09777a6a47e53848d986a5e72d6bd8b9b085ee48 d88a9037f0009ae0cc243f4b5419b5603160ef2a 4dcebb1aff4414e35db3a9d28cb7853119bd9dbe c3d4c907493116359366d09d5c38720603f1025d a777f68593804a4276162062e2df10aff4554f1d db43df0fb8de7f2c845fcd561f84ee27803bdfcd 255f376a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:db:ef:a1:dc:1c:4f:5c:39:f2:2b:a6:cb:35:41:fb:2a:9f:f0:d5] modulus: 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 public exponent: 10001 ] 2021-10-30 05:35:32.784  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-30 05:35:32.785 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-30 05:35:32.833 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-30 05:35:32.836 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-30 05:35:32.838  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-10-30 05:35:32.839  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-30 05:35:32.840  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-30 05:35:32.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-30 05:35:32.842 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-30 05:35:32.843 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-30 05:35:32.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-30 05:35:32.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:35:32.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:35:32.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:35:33.231  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-30 05:35:33.232  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-30 05:35:33.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-30 05:35:33.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:35:33.239  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-30 05:35:33.240  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-30 05:35:33.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:35:33.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:35:33.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:35:33.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:35:33.333 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:35:33.334 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:35:33.335 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:35:33.336 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:35:33.337 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:35:33.338 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-30 05:35:33.345 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 596874060364761968481743603990132320816506150629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 30 01:36:01 UTC 2021 Final Date: Thu Oct 30 01:36:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6 dd655376fc4fdc7e9c9c7441256e04c908bcdd24 9d62396f1318bacca223b71a5dd888ae34fccbb3 4249f78b7d8115eb5604ef091bc4f68bc14834c2 7b1e8386388baf06500fa6c15c0b8bade94d0024 31098c947e5e9f7bb4603d895003e40b8e140745 a2557376461d033a012cc38716c8e824b25beb91 bb3cd4c8cb214042ecbbf52cc7011236bff99deb c33b481fcdd456805cbd7f68cb26439d5592253b dd8a42dacfb5ad2ba702cf182defef5f0dd82995 0ec05c8bf4b2821fc67eb8b75159fda86a304f92 ca04f97261510ca3002680058b68d8d890df63cd e9c5c10701c3e2a7fb319f56d54060d5e79cc775 09777a6a47e53848d986a5e72d6bd8b9b085ee48 d88a9037f0009ae0cc243f4b5419b5603160ef2a 4dcebb1aff4414e35db3a9d28cb7853119bd9dbe c3d4c907493116359366d09d5c38720603f1025d a777f68593804a4276162062e2df10aff4554f1d db43df0fb8de7f2c845fcd561f84ee27803bdfcd 255f376a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:5c:18:42:82:c0:46:45:8b:94:01:b4:97:c2:99:2e:4e:2c:7a:24] modulus: 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 public exponent: 10001 ] 2021-10-30 05:40:21.735  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-30 05:40:21.736 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-30 05:40:21.739 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-30 05:40:21.741 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-30 05:40:21.742  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-30 05:40:21.743  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-30 05:40:21.743  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-30 05:40:21.743 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-30 05:40:21.743 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-30 05:40:21.744 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-30 05:40:21.748 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-30 05:40:21.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:40:21.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:40:21.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:40:21.948  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-30 05:40:21.949  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-30 05:40:21.950 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-30 05:40:21.951 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:40:21.953  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-30 05:40:21.954  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-30 05:40:21.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:40:21.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:40:21.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:40:21.956 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:40:21.956 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:40:21.956 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:40:21.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:40:21.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:40:21.958 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:40:22.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-30 05:40:22.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 596874060364761968481743603990132320816506150629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 30 01:36:01 UTC 2021 Final Date: Thu Oct 30 01:36:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6 dd655376fc4fdc7e9c9c7441256e04c908bcdd24 9d62396f1318bacca223b71a5dd888ae34fccbb3 4249f78b7d8115eb5604ef091bc4f68bc14834c2 7b1e8386388baf06500fa6c15c0b8bade94d0024 31098c947e5e9f7bb4603d895003e40b8e140745 a2557376461d033a012cc38716c8e824b25beb91 bb3cd4c8cb214042ecbbf52cc7011236bff99deb c33b481fcdd456805cbd7f68cb26439d5592253b dd8a42dacfb5ad2ba702cf182defef5f0dd82995 0ec05c8bf4b2821fc67eb8b75159fda86a304f92 ca04f97261510ca3002680058b68d8d890df63cd e9c5c10701c3e2a7fb319f56d54060d5e79cc775 09777a6a47e53848d986a5e72d6bd8b9b085ee48 d88a9037f0009ae0cc243f4b5419b5603160ef2a 4dcebb1aff4414e35db3a9d28cb7853119bd9dbe c3d4c907493116359366d09d5c38720603f1025d a777f68593804a4276162062e2df10aff4554f1d db43df0fb8de7f2c845fcd561f84ee27803bdfcd 255f376a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:21:08:17:f7:b2:9d:be:ad:6a:ca:17:05:20:35:06:80:fe:06:a5] modulus: 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 public exponent: 10001 ] 2021-10-30 05:40:55.114  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-30 05:40:55.115 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-30 05:40:55.117 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-30 05:40:55.117 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-30 05:40:55.118  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-10-30 05:40:55.129  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-30 05:40:55.130  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-30 05:40:55.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-30 05:40:55.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-30 05:40:55.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-30 05:40:55.134 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-30 05:40:55.135 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:40:55.135 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:40:55.135 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:40:55.216  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-30 05:40:55.217  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-30 05:40:55.218 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-30 05:40:55.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:40:55.233  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-30 05:40:55.233  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-30 05:40:55.234 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:40:55.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:40:55.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:40:55.236 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:40:55.236 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:40:55.237 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:40:55.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:40:55.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:40:55.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:40:55.239 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-30 05:40:55.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 596874060364761968481743603990132320816506150629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 30 01:36:01 UTC 2021 Final Date: Thu Oct 30 01:36:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6 dd655376fc4fdc7e9c9c7441256e04c908bcdd24 9d62396f1318bacca223b71a5dd888ae34fccbb3 4249f78b7d8115eb5604ef091bc4f68bc14834c2 7b1e8386388baf06500fa6c15c0b8bade94d0024 31098c947e5e9f7bb4603d895003e40b8e140745 a2557376461d033a012cc38716c8e824b25beb91 bb3cd4c8cb214042ecbbf52cc7011236bff99deb c33b481fcdd456805cbd7f68cb26439d5592253b dd8a42dacfb5ad2ba702cf182defef5f0dd82995 0ec05c8bf4b2821fc67eb8b75159fda86a304f92 ca04f97261510ca3002680058b68d8d890df63cd e9c5c10701c3e2a7fb319f56d54060d5e79cc775 09777a6a47e53848d986a5e72d6bd8b9b085ee48 d88a9037f0009ae0cc243f4b5419b5603160ef2a 4dcebb1aff4414e35db3a9d28cb7853119bd9dbe c3d4c907493116359366d09d5c38720603f1025d a777f68593804a4276162062e2df10aff4554f1d db43df0fb8de7f2c845fcd561f84ee27803bdfcd 255f376a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:a6:d7:8b:76:bb:96:20:fb:c9:b1:f2:32:30:36:e7:fb:9d:5d:7e] modulus: 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 public exponent: 10001 ] 2021-10-30 05:41:23.455  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-30 05:41:23.456 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-30 05:41:23.458 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-30 05:41:23.458 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-30 05:41:23.459  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-30 05:41:23.460  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-30 05:41:23.460  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-30 05:41:23.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-30 05:41:23.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-30 05:41:23.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-30 05:41:23.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-30 05:41:23.533 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:41:23.533 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:41:23.533 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:41:23.629  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-30 05:41:23.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-30 05:41:23.630 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-30 05:41:23.630 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:41:23.632  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-30 05:41:23.632  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-30 05:41:23.632 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:41:23.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:41:23.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:41:23.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:41:23.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:41:23.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:41:23.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:41:23.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:41:23.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:41:23.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-30 05:41:23.638 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 596874060364761968481743603990132320816506150629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 30 01:36:01 UTC 2021 Final Date: Thu Oct 30 01:36:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6 dd655376fc4fdc7e9c9c7441256e04c908bcdd24 9d62396f1318bacca223b71a5dd888ae34fccbb3 4249f78b7d8115eb5604ef091bc4f68bc14834c2 7b1e8386388baf06500fa6c15c0b8bade94d0024 31098c947e5e9f7bb4603d895003e40b8e140745 a2557376461d033a012cc38716c8e824b25beb91 bb3cd4c8cb214042ecbbf52cc7011236bff99deb c33b481fcdd456805cbd7f68cb26439d5592253b dd8a42dacfb5ad2ba702cf182defef5f0dd82995 0ec05c8bf4b2821fc67eb8b75159fda86a304f92 ca04f97261510ca3002680058b68d8d890df63cd e9c5c10701c3e2a7fb319f56d54060d5e79cc775 09777a6a47e53848d986a5e72d6bd8b9b085ee48 d88a9037f0009ae0cc243f4b5419b5603160ef2a 4dcebb1aff4414e35db3a9d28cb7853119bd9dbe c3d4c907493116359366d09d5c38720603f1025d a777f68593804a4276162062e2df10aff4554f1d db43df0fb8de7f2c845fcd561f84ee27803bdfcd 255f376a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:6c:f7:d4:ac:ed:79:58:6a:b6:74:62:92:dc:1b:10:92:ca:0e:26] modulus: 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 public exponent: 10001 ] 2021-10-30 05:41:29.842  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-30 05:41:29.843 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-30 05:41:29.844 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-30 05:41:29.845 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-30 05:41:29.845  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-10-30 05:41:29.846  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-30 05:41:29.846  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-30 05:41:29.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-30 05:41:29.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-30 05:41:29.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-30 05:41:29.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-30 05:41:29.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:41:29.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:41:29.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:41:30.016  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-30 05:41:30.017  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-30 05:41:30.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-30 05:41:30.018 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:41:30.019  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-30 05:41:30.019  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-30 05:41:30.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:41:30.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:41:30.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:41:30.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:41:30.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:41:30.022 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:41:30.024 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:41:30.024 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:41:30.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:41:30.026 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-30 05:41:30.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 596874060364761968481743603990132320816506150629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 30 01:36:01 UTC 2021 Final Date: Thu Oct 30 01:36:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9] modulus: adc61c9dbae8ea4da8c74bfc16b9563f008fc74bf7ac7bb2b824d799dbc4ae8e7f0d1f539d24269b45320411d4056384c0a72daf5370b6aada92a976a9536bf2e3419f8afee5280d7ecf07a22c8974d5f7086573f891921cac12843fe35d866b2e0b406a99b4f909b80898a55b0e9dd0c2320c127e3b879cb3db682e3d9a84615108ce90f96fa7e703bd46af055a28b3d70e22278c7213076aa50741225a9580956010965468d45eba59cbaea6890f719e7b8e12a71759b1b658e3bcca6448ee35983360875a9a198c39233256c9fa8787527fbeba1a62b616b102d1c3d17e702c7e1fea9197da56c810bb27f34f7051826bfd38d0d43096143fac548941f338f7bec2bdcb7b5c2af22c305aa2486f7240a05e96550bfbbc0def25a6d3f1e59efd8f1f0d0367442740b503663123f047ddcc6750c4a346d16c6acac27d3555a41d7eed7dbb2882f085e99714efd2e99bc7d76a9068c517eb2c99d3985eb5e2cdaff48ff834aa7c69faf49f85c6ce22c3fdae7cc68afdb3d53d627bed2c17d123 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6 dd655376fc4fdc7e9c9c7441256e04c908bcdd24 9d62396f1318bacca223b71a5dd888ae34fccbb3 4249f78b7d8115eb5604ef091bc4f68bc14834c2 7b1e8386388baf06500fa6c15c0b8bade94d0024 31098c947e5e9f7bb4603d895003e40b8e140745 a2557376461d033a012cc38716c8e824b25beb91 bb3cd4c8cb214042ecbbf52cc7011236bff99deb c33b481fcdd456805cbd7f68cb26439d5592253b dd8a42dacfb5ad2ba702cf182defef5f0dd82995 0ec05c8bf4b2821fc67eb8b75159fda86a304f92 ca04f97261510ca3002680058b68d8d890df63cd e9c5c10701c3e2a7fb319f56d54060d5e79cc775 09777a6a47e53848d986a5e72d6bd8b9b085ee48 d88a9037f0009ae0cc243f4b5419b5603160ef2a 4dcebb1aff4414e35db3a9d28cb7853119bd9dbe c3d4c907493116359366d09d5c38720603f1025d a777f68593804a4276162062e2df10aff4554f1d db43df0fb8de7f2c845fcd561f84ee27803bdfcd 255f376a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:c7:73:fa:d9:40:b1:59:77:9c:db:09:c6:a0:5e:12:be:65:14:18] modulus: b2d9dcd64c4b0d1768e54d4058803d708d149b71ad5b5827b33119a1e45f972860c0c6f9401d16db365514fd024c94b21150d89cbe81458959ed23934194a4405068330bc04b513bcb33c4e62fbfbaf2a797e7f8b91f5cb6e8ee8821d2d803c1535e31d1c2f3a2d12efed0ea67e26b2f2536c3ed2561149a9c26e620b9af0d1f6d8e13203581f88e60c6847cdd0d1b1c2b1854c7dbd77e0bc77eb9f455e5c213987b5032e5ce50df5c79430b6f0d70e2a581d6e23f0bd002e47897a49f8d43a6236699710ab5f5f66b6a468e692b1413b37b47d8c71a10a51e43291fd4eabe4fb85df1b0e2445d077c7393933bcc46be048a34633f187cf30d0213294ff6bd43 public exponent: 10001 ] 2021-10-30 05:42:54.144  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-30 05:42:54.145 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-30 05:42:54.146 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-30 05:42:54.147 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-30 05:42:54.147  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-10-30 05:42:54.148  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-30 05:42:54.148  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-30 05:42:54.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-30 05:42:54.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-30 05:42:54.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-30 05:42:54.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-30 05:42:54.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:42:54.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:42:54.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:42:54.234  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-30 05:42:54.235  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-30 05:42:54.235 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-30 05:42:54.235 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:42:54.236  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-30 05:42:54.236  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-30 05:42:54.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:42:54.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:42:54.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:42:54.238 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:42:54.238 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:42:54.238 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:42:54.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:42:54.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:42:54.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:42:54.240 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-30 05:42:54.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 596874060364761968481743603990132320816506150629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 30 01:36:01 UTC 2021 Final Date: Thu Oct 30 01:36:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6 dd655376fc4fdc7e9c9c7441256e04c908bcdd24 9d62396f1318bacca223b71a5dd888ae34fccbb3 4249f78b7d8115eb5604ef091bc4f68bc14834c2 7b1e8386388baf06500fa6c15c0b8bade94d0024 31098c947e5e9f7bb4603d895003e40b8e140745 a2557376461d033a012cc38716c8e824b25beb91 bb3cd4c8cb214042ecbbf52cc7011236bff99deb c33b481fcdd456805cbd7f68cb26439d5592253b dd8a42dacfb5ad2ba702cf182defef5f0dd82995 0ec05c8bf4b2821fc67eb8b75159fda86a304f92 ca04f97261510ca3002680058b68d8d890df63cd e9c5c10701c3e2a7fb319f56d54060d5e79cc775 09777a6a47e53848d986a5e72d6bd8b9b085ee48 d88a9037f0009ae0cc243f4b5419b5603160ef2a 4dcebb1aff4414e35db3a9d28cb7853119bd9dbe c3d4c907493116359366d09d5c38720603f1025d a777f68593804a4276162062e2df10aff4554f1d db43df0fb8de7f2c845fcd561f84ee27803bdfcd 255f376a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:d8:8e:02:1a:26:49:7f:be:b0:fc:65:f4:99:4a:13:46:c5:43:57] modulus: ad3ded8b953b614fe1347d89b674197ea72a27b8b78717fc8ff3631d3e32787d68906d270f2c52dc4a561b13aeffced7fc02e74fa9959c066f29dfcf9b8e02e045f1091becb01da7b523b4636e13db51a703379f5d06c11d75b7618755bfff1a25afaa9dc5f3890c73c0d4a7a1e40b340b773d264f05a0fbd8da78434402db6280d32e8eb60ce0ceb7570d4dbc9c21f5d5638746b273702a5beefb10cb30f8004b5bf4709a0264335a152b81b63db55e09ff3f7b33b8d9724e5fb9b1e80c835be8bf61d3b7062e1f7dfe725d5a54a87cce2b5ff26b6e57e536c03fd7220005088c8e75ec4c314edd61b39b16c3afb4014f679c1992e87471783c0f09faa35d2b public exponent: 10001 ] 2021-10-30 05:43:12.596  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-30 05:43:12.598 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-30 05:43:12.601 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-30 05:43:12.602 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-30 05:43:12.602  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-10-30 05:43:12.602  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-30 05:43:12.603  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-30 05:43:12.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-30 05:43:12.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-30 05:43:12.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-30 05:43:12.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-30 05:43:12.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:43:12.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:43:12.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:43:12.731  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-30 05:43:12.732  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-30 05:43:12.732 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-30 05:43:12.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:43:12.734  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-30 05:43:12.734  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-30 05:43:12.734 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:43:12.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:43:12.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:43:12.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:43:12.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:43:12.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:43:12.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:43:12.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:43:12.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:43:12.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-30 05:43:12.741 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 596874060364761968481743603990132320816506150629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 30 01:36:01 UTC 2021 Final Date: Thu Oct 30 01:36:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6 dd655376fc4fdc7e9c9c7441256e04c908bcdd24 9d62396f1318bacca223b71a5dd888ae34fccbb3 4249f78b7d8115eb5604ef091bc4f68bc14834c2 7b1e8386388baf06500fa6c15c0b8bade94d0024 31098c947e5e9f7bb4603d895003e40b8e140745 a2557376461d033a012cc38716c8e824b25beb91 bb3cd4c8cb214042ecbbf52cc7011236bff99deb c33b481fcdd456805cbd7f68cb26439d5592253b dd8a42dacfb5ad2ba702cf182defef5f0dd82995 0ec05c8bf4b2821fc67eb8b75159fda86a304f92 ca04f97261510ca3002680058b68d8d890df63cd e9c5c10701c3e2a7fb319f56d54060d5e79cc775 09777a6a47e53848d986a5e72d6bd8b9b085ee48 d88a9037f0009ae0cc243f4b5419b5603160ef2a 4dcebb1aff4414e35db3a9d28cb7853119bd9dbe c3d4c907493116359366d09d5c38720603f1025d a777f68593804a4276162062e2df10aff4554f1d db43df0fb8de7f2c845fcd561f84ee27803bdfcd 255f376a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:8f:33:85:65:0f:90:0f:8d:f1:27:8b:13:81:e0:a1:d6:ee:a7:7e] modulus: c5c6d422f28e90e956614fb6e759ae8e3f7464bec224dc20720c5e5c8abc4414dde3f7c96439b784662d71aeb0d9475c6b27a54c74f0cfc151884eff2c3670921c483f891888d46f42f9c42f9cd09d93561ad608d2919cf414b239a077c206760ad4a8ea5398f39705679e91aede9bc6deb50a543784c61e9a410e2b501c33463890481c04c73e73191942aef94c8246d203ee288c5d32ae64a23ea0369c6e885ce0fad0e4acd2913a23a34e2deb36fdc07338eebdc47d3ab66d2f7d4081564f8a7db3fb7d1c93daf325e057f2d288c544a4dfbf10333dd2492a05f34569e6e3a659826ed01b45c474b032f0a44f2b93c20898f78b9604f51cea36247c911355 public exponent: 10001 ] 2021-10-30 05:44:47.047  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-10-30 05:44:47.048 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-10-30 05:44:47.050 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-30 05:44:47.050 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-10-30 05:44:47.050  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-10-30 05:44:47.051  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-10-30 05:44:47.051  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-10-30 05:44:47.051 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-10-30 05:44:47.052 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-10-30 05:44:47.052 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-10-30 05:44:47.057 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-10-30 05:44:47.058 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:44:47.058 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-10-30 05:44:47.058 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:44:47.201  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-10-30 05:44:47.201  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-10-30 05:44:47.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-10-30 05:44:47.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-10-30 05:44:47.204  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-10-30 05:44:47.205  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-10-30 05:44:47.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:44:47.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:44:47.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:44:47.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:44:47.208 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:44:47.208 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:44:47.209 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-10-30 05:44:47.209 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-10-30 05:44:47.209 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-10-30 05:44:47.209 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-10-30 05:44:47.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 596874060364761968481743603990132320816506150629 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Oct 30 01:36:01 UTC 2021 Final Date: Thu Oct 30 01:36:00 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6 dd655376fc4fdc7e9c9c7441256e04c908bcdd24 9d62396f1318bacca223b71a5dd888ae34fccbb3 4249f78b7d8115eb5604ef091bc4f68bc14834c2 7b1e8386388baf06500fa6c15c0b8bade94d0024 31098c947e5e9f7bb4603d895003e40b8e140745 a2557376461d033a012cc38716c8e824b25beb91 bb3cd4c8cb214042ecbbf52cc7011236bff99deb c33b481fcdd456805cbd7f68cb26439d5592253b dd8a42dacfb5ad2ba702cf182defef5f0dd82995 0ec05c8bf4b2821fc67eb8b75159fda86a304f92 ca04f97261510ca3002680058b68d8d890df63cd e9c5c10701c3e2a7fb319f56d54060d5e79cc775 09777a6a47e53848d986a5e72d6bd8b9b085ee48 d88a9037f0009ae0cc243f4b5419b5603160ef2a 4dcebb1aff4414e35db3a9d28cb7853119bd9dbe c3d4c907493116359366d09d5c38720603f1025d a777f68593804a4276162062e2df10aff4554f1d db43df0fb8de7f2c845fcd561f84ee27803bdfcd 255f376a Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:12:5d:c0:2a:82:68:17:fe:fa:93:83:55:e8:40:07:a9:84:73:50] modulus: c57ad9a0f45af1c60f7dbf55612fbace4d15fef4624daa7978e2623ed9ec2efba9bad177ae8f866ff2cb40a88e81d4de1b9eca6269154fb3392d7e8c3f3a72db6400806083e48d0a28d0eac772c1addb6ba597ed55aa14b397d95e1d3a48e45ed2005a50bc08598d7ce8bb7ebb0568fda06903924b7a9018d92d99b4b8370ccb4967ea2e1d9011f1bf0f34f1c4a65e7f3963f2f8fadd7ea42391ed68fe38e2479d5ccf5da127b49be759b70e40b99082ffc96a49ab2e113d37e8da8b8a60b59a77778722f93f9e867632e56a8379d6e057bdacdcaf7291e0f50081086f6a8fedcb2f3903460d649d1fb687e70876919225054df0f91a729e55593769ed64d127 public exponent: 10001 ]