2021-11-11 02:04:09,933 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-11 02:04:14,330 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-11 02:04:17.433  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-11 02:04:32.335 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-11 02:04:33.829  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-11 02:04:34.620  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-11 02:04:49.135  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 41.696 seconds (JVM running for 49.243) 2021-11-11 02:05:34.524  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-11 02:05:34.616 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-11 02:05:34.825 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-11 02:05:34.828 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 02:05:34.915  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-11 02:05:34.921  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-11 02:05:34.923  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-11 02:05:34.926 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-11 02:05:34.926 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 02:05:34.929 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-11 02:05:35.017 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-11 02:05:35.021 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-11 02:05:35.231 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-11 02:05:35.236 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 02:05:35.314 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 02:05:35.320 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 02:05:37.023  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-11 02:05:37.026  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-11 02:05:37.026 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-11 02:05:37.028 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 02:05:37.034  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-11 02:05:37.034  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-11 02:05:37.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 02:05:37.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 02:05:37.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 02:05:37.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 02:05:37.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 02:05:37.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 02:05:37.222 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 02:05:37.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 02:05:37.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 02:05:37.225 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 02:05:37.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 267365819377903460596882028695138861049281698476 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 02:00:32 UTC 2021 Final Date: Tue Nov 11 02:00:31 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:db:f8:5e:58:e3:cd:a9:ce:be:6f:37:01:b6:e0:56:96:87:2e:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0188c46dd960c35ce8633a3d8ec4e75fb6132a96 671f653aa79f2593590a177f6bcb84535a5fe3b6 14b8cb127ab43883fd56aef0adf69cf43d5bc539 e338607eb0136065861548f8223143e664e99b4d 92fddb6cc8445023191a46fe4cd4d4ef341188bc 2b9ed896f9364ff1ebe13c1783d5e5f7683863cf abfda0c7c23189073dff58e62da3697971fa2583 e0a8326ad38896f2c9f79ee8516614cd477ab6d2 f58c8ccb8c7c57d998b31445207c1ba5340ef7b2 7a83b64d6dc53e0ebd5e6958204dcf564d11547f e590da2eaf09467ebd5fa8325893b3c1af9bdcd9 ba5327ad11ed51898ddcf1c884e3584456b5185f a00089075346651bfb624b8108d4ad9eee461559 2000f3ff19f946a3cb270bb1f2b1105985aa3e32 3b017ec6ebffcb114346e0f4eaa021ed3e780161 84df68f3d8f64485e944aea2a46b22917f213d30 45cd93f1ff97491209c4676e5cc135d3da8c123b b33e43500e054d46f51dc4d4173f454df33365dc 4a556ed007a84db520fa6c579b361da1d83260fd b40be68c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:09:7b:ed:b4:b4:37:4a:ae:c3:ca:e1:4d:78:1b:53:34:03:d7:f9] modulus: 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 public exponent: 10001 ] 2021-11-11 03:53:42.072  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-11 03:53:42.073 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-11 03:53:42.114 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-11 03:53:42.117 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 03:53:42.120  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-11 03:53:42.123  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-11 03:53:42.123  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-11 03:53:42.124 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-11 03:53:42.125 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-11 03:53:42.126 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-11 03:53:42.133 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-11 03:53:42.134 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:53:42.134 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:53:42.134 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:53:42.314  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-11 03:53:42.315  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-11 03:53:42.316 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-11 03:53:42.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:53:42.326  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-11 03:53:42.327  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-11 03:53:42.327 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:53:42.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:53:42.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:53:42.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:53:42.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:53:42.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:53:42.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:53:42.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:53:42.331 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:53:42.414 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 03:53:42.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 267365819377903460596882028695138861049281698476 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 02:00:32 UTC 2021 Final Date: Tue Nov 11 02:00:31 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:db:f8:5e:58:e3:cd:a9:ce:be:6f:37:01:b6:e0:56:96:87:2e:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0188c46dd960c35ce8633a3d8ec4e75fb6132a96 671f653aa79f2593590a177f6bcb84535a5fe3b6 14b8cb127ab43883fd56aef0adf69cf43d5bc539 e338607eb0136065861548f8223143e664e99b4d 92fddb6cc8445023191a46fe4cd4d4ef341188bc 2b9ed896f9364ff1ebe13c1783d5e5f7683863cf abfda0c7c23189073dff58e62da3697971fa2583 e0a8326ad38896f2c9f79ee8516614cd477ab6d2 f58c8ccb8c7c57d998b31445207c1ba5340ef7b2 7a83b64d6dc53e0ebd5e6958204dcf564d11547f e590da2eaf09467ebd5fa8325893b3c1af9bdcd9 ba5327ad11ed51898ddcf1c884e3584456b5185f a00089075346651bfb624b8108d4ad9eee461559 2000f3ff19f946a3cb270bb1f2b1105985aa3e32 3b017ec6ebffcb114346e0f4eaa021ed3e780161 84df68f3d8f64485e944aea2a46b22917f213d30 45cd93f1ff97491209c4676e5cc135d3da8c123b b33e43500e054d46f51dc4d4173f454df33365dc 4a556ed007a84db520fa6c579b361da1d83260fd b40be68c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:b4:70:b7:b4:7b:d6:a6:53:b9:5e:30:34:10:b5:d9:f0:d6:c1:8a] modulus: ba018a7fd4e2d6210a58ebd917180fb9916d3fe66bbdbdec7be8fbbbee1c012164e762a9eb723a0fc28b24d4878285367b20e6a6df492c82dade73c6f57eb9a37263b746c6567cbd7a428acdf171747ddc99317659ce090e1dedd47a8b57890265a8ce45443b43c7e338dee477677b26d4e6e5422892e67af919567e4981f80ea858f1c8d0be20fd7c99639186deb3544bb3ef153ff5211576409a35f84aab60f0cf3bb4877e7ea47ee664dd09536eb9f37a02910c709e9e85e9538cef07c20d37533c579c671bccab7b4a5ef3e8bf41880f73a432b2adce5856dc5f5b4cfd4c4a635cd3aee5a31537f9421af464bc68afc1e5850a4b13123908d3aeecc420cd public exponent: 10001 ] 2021-11-11 03:55:25.190  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-11 03:55:25.191 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-11 03:55:25.192 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-11 03:55:25.192 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 03:55:25.193  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-11 03:55:25.193  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-11 03:55:25.193  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-11 03:55:25.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-11 03:55:25.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-11 03:55:25.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-11 03:55:25.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-11 03:55:25.215 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:55:25.215 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:55:25.215 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:55:25.314  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-11 03:55:25.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-11 03:55:25.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-11 03:55:25.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:55:25.324  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-11 03:55:25.325  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-11 03:55:25.326 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:55:25.327 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:55:25.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:55:25.330 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:55:25.331 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:55:25.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:55:25.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:55:25.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:55:25.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:55:25.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 03:55:25.336 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 267365819377903460596882028695138861049281698476 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 02:00:32 UTC 2021 Final Date: Tue Nov 11 02:00:31 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:db:f8:5e:58:e3:cd:a9:ce:be:6f:37:01:b6:e0:56:96:87:2e:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0188c46dd960c35ce8633a3d8ec4e75fb6132a96 671f653aa79f2593590a177f6bcb84535a5fe3b6 14b8cb127ab43883fd56aef0adf69cf43d5bc539 e338607eb0136065861548f8223143e664e99b4d 92fddb6cc8445023191a46fe4cd4d4ef341188bc 2b9ed896f9364ff1ebe13c1783d5e5f7683863cf abfda0c7c23189073dff58e62da3697971fa2583 e0a8326ad38896f2c9f79ee8516614cd477ab6d2 f58c8ccb8c7c57d998b31445207c1ba5340ef7b2 7a83b64d6dc53e0ebd5e6958204dcf564d11547f e590da2eaf09467ebd5fa8325893b3c1af9bdcd9 ba5327ad11ed51898ddcf1c884e3584456b5185f a00089075346651bfb624b8108d4ad9eee461559 2000f3ff19f946a3cb270bb1f2b1105985aa3e32 3b017ec6ebffcb114346e0f4eaa021ed3e780161 84df68f3d8f64485e944aea2a46b22917f213d30 45cd93f1ff97491209c4676e5cc135d3da8c123b b33e43500e054d46f51dc4d4173f454df33365dc 4a556ed007a84db520fa6c579b361da1d83260fd b40be68c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:36:4e:ae:41:ea:21:e8:54:b3:d6:4b:a4:75:2a:fc:f4:e2:64:aa] modulus: ce078f2c7910dea2d6bf2fb56cf7e907228fb794c290e95df8c159137f03f0389263af9800e45e96e50a76799df031d72f2792bcc0fb79ec51dc41cb92e6435817ec2b7f69b0742104bf86415b1276a36105605c5ef0dfa5f4065a5e3e1dc1cf761e54fea35b13f6f5ab40de027379066f2fd67678243219b8d30416756abd3e1107b1168130b6ffc6917fa1387426e3f8b1ebf2650f7ea117cc76b9a69a9afb59cb4d15724c805b612593c8422e4012b4a84c4c3add82d5c6a16188295ca4cddd1723163eaa997c96881bfda607f2a59ab581697e607b4d54ce4fa4f3430d2b1dba7da07989cd970a335f2671de344a34377aa8dabd190e8bf303a15a696a2d public exponent: 10001 ] 2021-11-11 03:58:15.950  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-11 03:58:15.951 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-11 03:58:15.953 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-11 03:58:15.954 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 03:58:15.954  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-11 03:58:15.955  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-11 03:58:15.955  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-11 03:58:15.955 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-11 03:58:15.955 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-11 03:58:15.956 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-11 03:58:15.959 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-11 03:58:15.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:58:15.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:58:15.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:58:16.098  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-11 03:58:16.099  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-11 03:58:16.100 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-11 03:58:16.100 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:58:16.114  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-11 03:58:16.114  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-11 03:58:16.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:58:16.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:58:16.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:58:16.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:58:16.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:58:16.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:58:16.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:58:16.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:58:16.118 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:58:16.118 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 03:58:16.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 267365819377903460596882028695138861049281698476 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 02:00:32 UTC 2021 Final Date: Tue Nov 11 02:00:31 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:db:f8:5e:58:e3:cd:a9:ce:be:6f:37:01:b6:e0:56:96:87:2e:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0188c46dd960c35ce8633a3d8ec4e75fb6132a96 671f653aa79f2593590a177f6bcb84535a5fe3b6 14b8cb127ab43883fd56aef0adf69cf43d5bc539 e338607eb0136065861548f8223143e664e99b4d 92fddb6cc8445023191a46fe4cd4d4ef341188bc 2b9ed896f9364ff1ebe13c1783d5e5f7683863cf abfda0c7c23189073dff58e62da3697971fa2583 e0a8326ad38896f2c9f79ee8516614cd477ab6d2 f58c8ccb8c7c57d998b31445207c1ba5340ef7b2 7a83b64d6dc53e0ebd5e6958204dcf564d11547f e590da2eaf09467ebd5fa8325893b3c1af9bdcd9 ba5327ad11ed51898ddcf1c884e3584456b5185f a00089075346651bfb624b8108d4ad9eee461559 2000f3ff19f946a3cb270bb1f2b1105985aa3e32 3b017ec6ebffcb114346e0f4eaa021ed3e780161 84df68f3d8f64485e944aea2a46b22917f213d30 45cd93f1ff97491209c4676e5cc135d3da8c123b b33e43500e054d46f51dc4d4173f454df33365dc 4a556ed007a84db520fa6c579b361da1d83260fd b40be68c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:95:a1:bf:31:72:33:40:8c:6a:fe:91:ee:06:6f:ca:9b:96:44:34] modulus: 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 public exponent: 10001 ] 2021-11-11 03:58:36.345  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-11 03:58:36.346 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-11 03:58:36.348 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-11 03:58:36.348 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 03:58:36.348  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-11 03:58:36.415  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-11 03:58:36.416  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-11 03:58:36.416 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-11 03:58:36.417 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-11 03:58:36.418 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-11 03:58:36.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-11 03:58:36.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:58:36.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:58:36.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:58:36.597  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-11 03:58:36.598  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-11 03:58:36.598 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-11 03:58:36.598 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:58:36.600  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-11 03:58:36.600  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-11 03:58:36.600 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:58:36.601 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:58:36.613 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:58:36.614 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:58:36.614 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:58:36.614 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:58:36.615 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:58:36.615 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:58:36.615 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:58:36.616 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 03:58:36.618 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 267365819377903460596882028695138861049281698476 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 02:00:32 UTC 2021 Final Date: Tue Nov 11 02:00:31 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:db:f8:5e:58:e3:cd:a9:ce:be:6f:37:01:b6:e0:56:96:87:2e:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0188c46dd960c35ce8633a3d8ec4e75fb6132a96 671f653aa79f2593590a177f6bcb84535a5fe3b6 14b8cb127ab43883fd56aef0adf69cf43d5bc539 e338607eb0136065861548f8223143e664e99b4d 92fddb6cc8445023191a46fe4cd4d4ef341188bc 2b9ed896f9364ff1ebe13c1783d5e5f7683863cf abfda0c7c23189073dff58e62da3697971fa2583 e0a8326ad38896f2c9f79ee8516614cd477ab6d2 f58c8ccb8c7c57d998b31445207c1ba5340ef7b2 7a83b64d6dc53e0ebd5e6958204dcf564d11547f e590da2eaf09467ebd5fa8325893b3c1af9bdcd9 ba5327ad11ed51898ddcf1c884e3584456b5185f a00089075346651bfb624b8108d4ad9eee461559 2000f3ff19f946a3cb270bb1f2b1105985aa3e32 3b017ec6ebffcb114346e0f4eaa021ed3e780161 84df68f3d8f64485e944aea2a46b22917f213d30 45cd93f1ff97491209c4676e5cc135d3da8c123b b33e43500e054d46f51dc4d4173f454df33365dc 4a556ed007a84db520fa6c579b361da1d83260fd b40be68c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:a3:18:4e:f0:b6:52:21:77:80:87:2a:3b:6e:41:39:11:e3:fa:b2] modulus: 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 public exponent: 10001 ] 2021-11-11 03:58:48.655  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-11 03:58:48.656 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-11 03:58:48.657 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-11 03:58:48.657 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 03:58:48.658  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-11 03:58:48.658  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-11 03:58:48.658  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-11 03:58:48.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-11 03:58:48.658 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-11 03:58:48.659 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-11 03:58:48.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-11 03:58:48.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:58:48.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:58:48.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:58:48.742  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-11 03:58:48.742  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-11 03:58:48.742 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-11 03:58:48.743 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:58:48.743  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-11 03:58:48.744  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-11 03:58:48.744 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:58:48.744 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:58:48.744 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:58:48.745 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:58:48.745 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:58:48.745 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:58:48.745 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:58:48.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:58:48.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:58:48.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 03:58:48.748 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 267365819377903460596882028695138861049281698476 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 02:00:32 UTC 2021 Final Date: Tue Nov 11 02:00:31 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:db:f8:5e:58:e3:cd:a9:ce:be:6f:37:01:b6:e0:56:96:87:2e:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0188c46dd960c35ce8633a3d8ec4e75fb6132a96 671f653aa79f2593590a177f6bcb84535a5fe3b6 14b8cb127ab43883fd56aef0adf69cf43d5bc539 e338607eb0136065861548f8223143e664e99b4d 92fddb6cc8445023191a46fe4cd4d4ef341188bc 2b9ed896f9364ff1ebe13c1783d5e5f7683863cf abfda0c7c23189073dff58e62da3697971fa2583 e0a8326ad38896f2c9f79ee8516614cd477ab6d2 f58c8ccb8c7c57d998b31445207c1ba5340ef7b2 7a83b64d6dc53e0ebd5e6958204dcf564d11547f e590da2eaf09467ebd5fa8325893b3c1af9bdcd9 ba5327ad11ed51898ddcf1c884e3584456b5185f a00089075346651bfb624b8108d4ad9eee461559 2000f3ff19f946a3cb270bb1f2b1105985aa3e32 3b017ec6ebffcb114346e0f4eaa021ed3e780161 84df68f3d8f64485e944aea2a46b22917f213d30 45cd93f1ff97491209c4676e5cc135d3da8c123b b33e43500e054d46f51dc4d4173f454df33365dc 4a556ed007a84db520fa6c579b361da1d83260fd b40be68c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:28:7e:bc:33:5b:cd:a0:ee:86:fe:6c:0e:d0:3d:14:5a:11:f5:d9] modulus: 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 public exponent: 10001 ] 2021-11-11 03:59:23.799  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-11 03:59:23.801 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-11 03:59:23.802 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-11 03:59:23.803 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 03:59:23.803  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-11 03:59:23.804  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-11 03:59:23.805  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-11 03:59:23.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-11 03:59:23.806 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-11 03:59:23.806 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-11 03:59:23.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-11 03:59:23.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:59:23.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 03:59:23.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:59:23.895  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-11 03:59:23.913  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-11 03:59:23.914 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-11 03:59:23.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 03:59:23.916  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-11 03:59:23.916  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-11 03:59:23.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:59:23.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:59:23.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:59:23.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:59:23.919 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:59:23.919 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:59:23.920 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 03:59:23.920 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 03:59:23.920 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 03:59:23.921 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 03:59:23.923 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 267365819377903460596882028695138861049281698476 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 02:00:32 UTC 2021 Final Date: Tue Nov 11 02:00:31 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:db:f8:5e:58:e3:cd:a9:ce:be:6f:37:01:b6:e0:56:96:87:2e:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0188c46dd960c35ce8633a3d8ec4e75fb6132a96 671f653aa79f2593590a177f6bcb84535a5fe3b6 14b8cb127ab43883fd56aef0adf69cf43d5bc539 e338607eb0136065861548f8223143e664e99b4d 92fddb6cc8445023191a46fe4cd4d4ef341188bc 2b9ed896f9364ff1ebe13c1783d5e5f7683863cf abfda0c7c23189073dff58e62da3697971fa2583 e0a8326ad38896f2c9f79ee8516614cd477ab6d2 f58c8ccb8c7c57d998b31445207c1ba5340ef7b2 7a83b64d6dc53e0ebd5e6958204dcf564d11547f e590da2eaf09467ebd5fa8325893b3c1af9bdcd9 ba5327ad11ed51898ddcf1c884e3584456b5185f a00089075346651bfb624b8108d4ad9eee461559 2000f3ff19f946a3cb270bb1f2b1105985aa3e32 3b017ec6ebffcb114346e0f4eaa021ed3e780161 84df68f3d8f64485e944aea2a46b22917f213d30 45cd93f1ff97491209c4676e5cc135d3da8c123b b33e43500e054d46f51dc4d4173f454df33365dc 4a556ed007a84db520fa6c579b361da1d83260fd b40be68c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:77:b7:c1:24:0b:7f:42:16:c6:1a:01:91:d3:fe:a8:40:79:84:e1] modulus: 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 public exponent: 10001 ] 2021-11-11 04:00:48.368  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-11 04:00:48.369 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-11 04:00:48.370 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-11 04:00:48.371 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 04:00:48.371  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-11 04:00:48.372  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-11 04:00:48.372  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-11 04:00:48.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-11 04:00:48.372 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-11 04:00:48.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-11 04:00:48.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-11 04:00:48.377 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 04:00:48.378 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 04:00:48.378 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 04:00:48.494  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-11 04:00:48.495  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-11 04:00:48.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-11 04:00:48.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 04:00:48.498  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-11 04:00:48.498  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-11 04:00:48.499 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 04:00:48.499 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 04:00:48.499 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 04:00:48.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 04:00:48.501 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 04:00:48.501 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 04:00:48.502 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 04:00:48.503 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 04:00:48.503 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 04:00:48.504 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 04:00:48.516 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 267365819377903460596882028695138861049281698476 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 02:00:32 UTC 2021 Final Date: Tue Nov 11 02:00:31 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:db:f8:5e:58:e3:cd:a9:ce:be:6f:37:01:b6:e0:56:96:87:2e:c6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0188c46dd960c35ce8633a3d8ec4e75fb6132a96 671f653aa79f2593590a177f6bcb84535a5fe3b6 14b8cb127ab43883fd56aef0adf69cf43d5bc539 e338607eb0136065861548f8223143e664e99b4d 92fddb6cc8445023191a46fe4cd4d4ef341188bc 2b9ed896f9364ff1ebe13c1783d5e5f7683863cf abfda0c7c23189073dff58e62da3697971fa2583 e0a8326ad38896f2c9f79ee8516614cd477ab6d2 f58c8ccb8c7c57d998b31445207c1ba5340ef7b2 7a83b64d6dc53e0ebd5e6958204dcf564d11547f e590da2eaf09467ebd5fa8325893b3c1af9bdcd9 ba5327ad11ed51898ddcf1c884e3584456b5185f a00089075346651bfb624b8108d4ad9eee461559 2000f3ff19f946a3cb270bb1f2b1105985aa3e32 3b017ec6ebffcb114346e0f4eaa021ed3e780161 84df68f3d8f64485e944aea2a46b22917f213d30 45cd93f1ff97491209c4676e5cc135d3da8c123b b33e43500e054d46f51dc4d4173f454df33365dc 4a556ed007a84db520fa6c579b361da1d83260fd b40be68c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:14:a9:b1:06:b2:c8:7e:2a:7b:5c:5d:b4:e5:ec:ed:00:e2:f8:40] modulus: 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 public exponent: 10001 ] 2021-11-11 04:01:06.727  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-11 04:01:06.729 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-11 04:01:06.730 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-11 04:01:06.731 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-11 04:01:06.732  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-11 04:01:06.732  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-11 04:01:06.732  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-11 04:01:06.733 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-11 04:01:06.733 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-11 04:01:06.733 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-11 04:01:06.737 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-11 04:01:06.737 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 04:01:06.737 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-11 04:01:06.738 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 04:01:06.798  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-11 04:01:06.799  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-11 04:01:06.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-11 04:01:06.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-11 04:01:06.802  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-11 04:01:06.813  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-11 04:01:06.814 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 04:01:06.815 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 04:01:06.815 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 04:01:06.816 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 04:01:06.817 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 04:01:06.817 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 04:01:06.818 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-11 04:01:06.819 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-11 04:01:06.819 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-11 04:01:06.820 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-11 04:01:06.824 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 267365819377903460596882028695138861049281698476 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 11 02:00:32 UTC 2021 Final Date: Tue Nov 11 02:00:31 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f2:db:f8:5e:58:e3:cd:a9:ce:be:6f:37:01:b6:e0:56:96:87:2e:c6] modulus: 8647800ceebf5be898f9685e6cf2c5e1376f6b8af4b146e702fd98307452585de44b46a007b05156835874886dfdf58ce07bb770478fee5867e7d27dd4303e7b65f9abe694fa5eb075c68a6aabe4c7a753a892f01ded7b031b28ccd8c3c640e8616bca52911fe6af65c7f95b100c594801ae8ae5d09cfd907344f86a4ff7860bd748a5cc09a47cd9feec41e9e67e0afc30fa2688ac1c6e8414723971b438b11e07371168754395abd9b025c8eee5f6e3a6241ba8804ebd7337ea5ed3f153dfa955adb6adc0e64451d8471482005559890f952087a77931b3183de5a06054e901a658b3a56807650ef4e5f10643ae2b9442f47fd2f928544f8c993c72af9a4882c85e1df47a67a8882e5ee20163b95e75295aa2a8fed019ada690679941f96f713a44bc03f789b81554d5fc696ee4bcdee7dde754a66757a63e36f9b31431164a16399228e139580c9195f4d7694d1859dc4952b611c7e312cf0409d560a682889e3df4e1e6b11e7d8c7c43b42fdb41c59f49f7d614ba1e098361ea8d13d0661b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0188c46dd960c35ce8633a3d8ec4e75fb6132a96 671f653aa79f2593590a177f6bcb84535a5fe3b6 14b8cb127ab43883fd56aef0adf69cf43d5bc539 e338607eb0136065861548f8223143e664e99b4d 92fddb6cc8445023191a46fe4cd4d4ef341188bc 2b9ed896f9364ff1ebe13c1783d5e5f7683863cf abfda0c7c23189073dff58e62da3697971fa2583 e0a8326ad38896f2c9f79ee8516614cd477ab6d2 f58c8ccb8c7c57d998b31445207c1ba5340ef7b2 7a83b64d6dc53e0ebd5e6958204dcf564d11547f e590da2eaf09467ebd5fa8325893b3c1af9bdcd9 ba5327ad11ed51898ddcf1c884e3584456b5185f a00089075346651bfb624b8108d4ad9eee461559 2000f3ff19f946a3cb270bb1f2b1105985aa3e32 3b017ec6ebffcb114346e0f4eaa021ed3e780161 84df68f3d8f64485e944aea2a46b22917f213d30 45cd93f1ff97491209c4676e5cc135d3da8c123b b33e43500e054d46f51dc4d4173f454df33365dc 4a556ed007a84db520fa6c579b361da1d83260fd b40be68c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:24:e1:19:db:7a:17:b4:64:10:ab:d4:f6:40:e7:ea:c3:74:af:c5] modulus: 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 public exponent: 10001 ]