2021-11-12 01:58:03,309 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-12 01:58:06,835 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-12 01:58:09.516  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-12 01:58:21.216 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-12 01:58:22.530  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-12 01:58:23.118  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-12 01:58:33.528  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 32.111 seconds (JVM running for 38.272) 2021-11-12 01:59:23.826  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-12 01:59:23.915 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-12 01:59:24.015 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-12 01:59:24.019 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 01:59:24.113  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-12 01:59:24.117  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-12 01:59:24.117  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-12 01:59:24.119 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-12 01:59:24.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 01:59:24.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-12 01:59:24.131 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-12 01:59:24.212 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-12 01:59:24.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-12 01:59:24.414 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 01:59:24.415 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 01:59:24.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 01:59:25.636  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-12 01:59:25.639  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-12 01:59:25.640 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-12 01:59:25.711 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 01:59:25.719  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-12 01:59:25.721  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-12 01:59:25.721 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 01:59:25.722 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 01:59:25.722 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 01:59:25.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 01:59:25.818 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 01:59:25.818 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 01:59:25.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 01:59:25.825 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 01:59:25.825 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 01:59:25.827 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 01:59:26.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:1f:87:99:5f:d1:18:5a:0c:44:69:94:4a:8a:41:9e:bb:01:9c:7f] modulus: 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 public exponent: 10001 ] 2021-11-12 03:57:45.063  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-12 03:57:45.065 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-12 03:57:45.067 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-12 03:57:45.068 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 03:57:45.069  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-12 03:57:45.070  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-12 03:57:45.070  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-12 03:57:45.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-12 03:57:45.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-12 03:57:45.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-12 03:57:45.116 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-12 03:57:45.117 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 03:57:45.117 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 03:57:45.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 03:57:45.327  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-12 03:57:45.327  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-12 03:57:45.328 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-12 03:57:45.328 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 03:57:45.332  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-12 03:57:45.333  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-12 03:57:45.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 03:57:45.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 03:57:45.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 03:57:45.335 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 03:57:45.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 03:57:45.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 03:57:45.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 03:57:45.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 03:57:45.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 03:57:45.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 03:57:45.416 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: af3a0d52a8c2e7f578a6aca1a5c84cbc47b4a37cbf77077c90d12d185ad0a18b1fcad102b95abba070b45ccb1aa469f92eed36c8130fdf6d9149651e27ce800631ce32e19166a892973db4d85f4b621bde78781de384fcc9ea13c5ea28fc348105f58fc67e633681cd29a1248eb438c85437e915402a65e9e785c1b4f498c49044c0e35a321de31fd2bbeb1a6e0e389f4e37d7e5bf7ee7ef87fdfcaf41526313634739e1315cf97220828131f01fb717a3dd2b91ee02167cb940f029c1a61f70db0a7c7569b0f393018906f562f0b3185490cb90bd58ca59c7fda16e28e862c8e855d296da87ccf7a5769701e8053ce4fc4497087ec1671480dea182bfb76e1a893218be81e5bc743a1ab4fabff2a6bda864d76cc33749e53b080cb883402563b41ce445ee9bc1c0081b5256a8aeb1568cd0fccd91cb9c8f7f3548aad38e4ecf5ed700a6ae7ac9b057b934dfc50763a83a3613b3878edc21cf9d272f2f2c58b8c90162383fc20415966d6f9b33e9e3ec3d5f29a54fea6aad3055955b1998f3b3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:55:39:e4:15:f7:a9:f7:60:7a:67:0c:92:cb:b5:75:b2:10:0d:7c] modulus: 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 public exponent: 10001 ] 2021-11-12 04:02:22.871  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-12 04:02:22.873 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-12 04:02:22.874 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:02:22.875 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:02:22.875  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:02:22.876  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-12 04:02:22.877  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-12 04:02:22.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-12 04:02:22.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-12 04:02:22.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-12 04:02:22.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-12 04:02:22.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:02:22.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:02:22.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:02:22.989  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-12 04:02:22.990  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-12 04:02:22.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-12 04:02:22.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:02:23.011  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-12 04:02:23.012  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-12 04:02:23.013 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:23.013 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:23.013 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:23.014 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:23.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:23.015 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:23.016 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:23.016 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:23.017 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:23.017 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:02:23.020 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:37:8f:fb:3d:94:b8:06:2d:f5:3a:9f:0b:cd:2b:02:6f:f8:a7:09] modulus: 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 public exponent: 10001 ] 2021-11-12 04:02:55.926  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-12 04:02:55.927 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-12 04:02:55.928 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-12 04:02:55.929 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:02:55.929  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-12 04:02:55.930  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-12 04:02:55.930  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-12 04:02:55.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-12 04:02:55.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-12 04:02:55.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-12 04:02:55.935 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-12 04:02:55.935 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:02:55.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:02:55.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:02:56.109  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-12 04:02:56.109  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-12 04:02:56.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-12 04:02:56.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:02:56.112  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-12 04:02:56.112  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-12 04:02:56.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:56.113 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:56.113 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:56.114 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:56.114 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:56.114 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:56.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:02:56.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:02:56.116 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:02:56.117 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:02:56.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:6a:e7:72:c4:bc:e1:f6:9b:74:60:67:4d:2d:64:b3:47:14:c1:97] modulus: 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 public exponent: 10001 ] 2021-11-12 04:03:27.975  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-12 04:03:27.976 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-12 04:03:27.977 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-12 04:03:27.978 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:03:27.978  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-12 04:03:27.979  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-12 04:03:27.979  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-12 04:03:27.980 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-12 04:03:27.980 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-12 04:03:27.980 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-12 04:03:27.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-12 04:03:27.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:03:27.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:03:27.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:03:28.081  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-12 04:03:28.082  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-12 04:03:28.082 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-12 04:03:28.083 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:03:28.084  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-12 04:03:28.084  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-12 04:03:28.085 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:03:28.085 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:03:28.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:03:28.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:03:28.087 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:03:28.087 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:03:28.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:03:28.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:03:28.089 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:03:28.089 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:03:28.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:17:3a:c5:6c:6d:76:88:d2:72:ad:69:5c:71:57:7d:65:b0:0b:92] modulus: c5c99c09c5e36a9ca569cafb62a1bb5ec0b98085422f0cc65022c2fec23f844748b734e47180b457e8b43bf26bcb7c80099fd68bab77f5aefb0f8e7b2fab0982140e56061025fec7d8f62e0bf20fffc0bfe28fb552ad1b189b37895608666b6cedf735d69fc93b687aaf29f5bd869bc4a97c5a90596ae944f46ce3c02d224f2325835beea5a19e7cca8e4c8776477bdaa6e3d8f4e029d1edaf235919ecffd874b060fc7eaa63911a2df5f9280fd108e9c6c308bbcddb829473b89eb6509c4446064cf5b6a2c118b7110978f71e5eede21f81fb9fcbe73cfb913819e288c0eade30254da2d3cf1608a007379db29a28eb474519086040fc30d255903630e64c3b public exponent: 10001 ] 2021-11-12 04:04:07.303  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-12 04:04:07.304 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-12 04:04:07.305 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:04:07.305 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:04:07.306  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:04:07.307  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-12 04:04:07.307  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-12 04:04:07.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-12 04:04:07.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-12 04:04:07.309 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-12 04:04:07.314 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-12 04:04:07.314 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:04:07.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:04:07.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:04:07.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-12 04:04:07.387  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-12 04:04:07.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-12 04:04:07.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:04:07.409  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-12 04:04:07.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-12 04:04:07.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:04:07.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:04:07.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:04:07.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:04:07.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:04:07.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:04:07.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:04:07.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:04:07.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:04:07.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:04:07.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [47:08:9a:ac:ac:60:1d:56:3b:85:65:7e:7e:c3:59:1c:a4:79:98:5a] modulus: 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 public exponent: 10001 ] 2021-11-12 04:05:12.941  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-12 04:05:12.942 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-12 04:05:12.943 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:05:12.943 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:05:12.943  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-12 04:05:12.944  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-12 04:05:12.944  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-12 04:05:12.944 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-12 04:05:12.945 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-12 04:05:12.945 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-12 04:05:12.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-12 04:05:12.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:05:12.950 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:05:12.950 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:05:13.085  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-12 04:05:13.086  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-12 04:05:13.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-12 04:05:13.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:05:13.109  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-12 04:05:13.109  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-12 04:05:13.109 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:05:13.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:05:13.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:05:13.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:05:13.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:05:13.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:05:13.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:05:13.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:05:13.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:05:13.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:05:13.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:78:f1:94:c0:3e:5c:7d:e2:c2:97:eb:c4:41:74:3b:1f:f1:5b:47] modulus: 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 public exponent: 10001 ] 2021-11-12 04:07:20.798  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-12 04:07:20.799 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-12 04:07:20.803 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:07:20.804 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:07:20.804  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-12 04:07:20.805  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-12 04:07:20.805  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-12 04:07:20.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-12 04:07:20.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-12 04:07:20.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-12 04:07:20.812 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-12 04:07:20.812 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:07:20.812 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:07:20.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:07:20.896  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-12 04:07:20.897  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-12 04:07:20.897 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-12 04:07:20.897 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:07:20.899  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-12 04:07:20.899  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-12 04:07:20.899 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:07:20.900 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:07:20.900 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:07:20.900 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:07:20.901 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:07:20.901 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:07:20.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:07:20.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:07:20.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:07:20.903 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:07:20.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:17:a3:21:1e:37:a4:50:bd:44:a9:ed:de:d8:bd:8b:81:4e:c7:f0] modulus: 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 public exponent: 10001 ] 2021-11-12 04:08:53.788  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-12 04:08:53.789 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-12 04:08:53.791 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-12 04:08:53.792 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-12 04:08:53.792  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-12 04:08:53.793  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-12 04:08:53.793  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-12 04:08:53.794 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-12 04:08:53.794 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-12 04:08:53.794 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-12 04:08:53.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-12 04:08:53.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:08:53.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-12 04:08:53.800 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:08:53.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-12 04:08:53.910  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-12 04:08:53.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-12 04:08:53.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-12 04:08:53.912  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-12 04:08:53.912  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-12 04:08:53.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:08:53.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:08:53.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:08:53.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:08:53.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:08:53.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:08:53.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-12 04:08:53.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-12 04:08:53.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-12 04:08:53.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-12 04:08:53.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 153936293021502038981988600957010766290467638452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 12 01:54:42 UTC 2021 Final Date: Wed Nov 12 01:54:41 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:1d:57:47:1e:f5:8e:7c:c4:cc:85:02:21:ca:1d:50:01:dd:f2:a2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3ba00ef20e53ecd60d1256b415a678f0225bf695 e20505bda12330986df9c46fee9b0e06a07c2600 3d0ebe52f8c35ecae7e0f5783be5433edc058dc1 ea1d291433ad177d090dae8846c63d6d5e9ec22a 33c279dbc0e39722014562cf40ba0c9daa101d29 a31d31fa053c036460a168849ca5396a1260fae4 9c1e8ec01f6efad44ec91a9bdf877cc91cb448db a2469c3db9e280d7848f1f0ce99e415c691a5203 7993c83c7f82c52493f0f020724dee55e7468386 72c2edf4e63a14168d1c2f366fa2ff2ed75472d0 d518ecdd33cfbb17734db5de5df35e9c745b29c5 43c2cce2f579254972ad6597988baad6034785f5 6eeab04f49ca00b9b2cac54f0638fc68306f58fd 33f2dc21a5bd0ce0a9775d84e93677bc8dfc6254 3edc7eef0c8a175404b63b556826807ddbbe38ac fe40ec14c084808e9d3b6b5389820d88b2f68604 cff7ab676c85c43c4a4b3d8b82a1428ebd187f2c 262a90bdbcc6f5342f0deecd6124f757fc15c8fd f8bef1143d3120a3873bd238002d49463a0250ca c0066d25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:a1:8c:82:6c:d0:f3:50:f7:4c:9c:00:6c:df:9f:15:e4:b8:47:6c] modulus: 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 public exponent: 10001 ]