2021-11-15 01:43:38,775 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-15 01:43:43,574 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-15 01:43:47.370  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-15 01:44:02.871 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-15 01:44:03.975  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-15 01:44:04.776  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-15 01:44:18.268  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 41.899 seconds (JVM running for 49.813) 2021-11-15 01:46:23.470  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-15 01:46:23.558 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-15 01:46:23.680 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-15 01:46:23.761 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-15 01:46:23.863  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-15 01:46:23.868  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-15 01:46:23.869  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-15 01:46:23.871 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-15 01:46:23.871 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 01:46:23.874 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-15 01:46:23.879 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-15 01:46:23.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-15 01:46:24.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-15 01:46:24.177 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 01:46:24.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 01:46:24.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 01:46:25.777  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-15 01:46:25.780  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-15 01:46:25.859 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-15 01:46:25.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 01:46:25.875  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-15 01:46:25.875  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-15 01:46:25.876 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 01:46:25.877 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 01:46:25.877 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 01:46:25.969 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 01:46:25.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 01:46:25.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 01:46:25.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 01:46:25.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 01:46:26.058 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 01:46:26.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-15 01:46:26.168 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336533179640793221909354102753461990379235729328 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 15 01:38:22 UTC 2021 Final Date: Sat Nov 15 01:38:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:20:25:0b:cd:5a:dc:f2:8d:35:28:ae:e8:4c:23:62:2d:ec:1f:65] modulus: a9acfa1147ab1ef70c2bc99e5be7f4b437d15b9652fdc334de875a1b083f89fe8c0e05582b0c69bebd994397651eea53b24f19847360b872e25dacdb921fb95ba9a85bd6a7bca4ea0231c51af5909c29c750aa3f0acb7ef7e5456e369b3478aa4e6052a1d95ac99393fb88820d5798e2834c40edc63f0bec57a3a272ffc45f0540814bed0adfb4e1a37879dbbda9b42f9696bf9f194ec88e09994cc19ef79e2dc3349576bd0c019ba8d5b10ababac8c9c9922347aacd86e2de97c9769c1c7fca45154c440be939c849fa4ab8b639ff28f8744e0f964786d30cfe33cee0270583d99a7d3892e1025a9f45f18d1ebd50ee7374d22a67e2745a9f6c71a46bbf020c4277468b94e9483ada9e7afa59b72c623d363f38b783415adabfad31882f1d60c8a02f5d895673b1b703acbce10d0053ff674b9ad16df67a495e1b8adc508a25154bf54918d86fa2ed07decda0c64d3ddc81d7b29967c25e7664a1bb7434c46035776b7f8485778bae2507f0d30e3d7f21491da3eaa5546da86b95f3367e423d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98b182dfe975a6cb2446935d4e93a7c2c45ee6e3 79df9831dea333ecba52fe6c927a9a24731c1804 fd36de1da5be3ff8c650a71c902d87d74aab58c7 79f1fd13ae8a46b9f63a7d3d42eaca31082ab53b f96530de2ad232f9377978c10b88e5be400c7410 63c236929d10fbf328ac50899e473248698da33e 7392960433408a14d303a941662de507234b40cc 983dbd0abae5783bce6d061d0ad922a643b4a511 d4aabac1147416b943400b30276cba5e9fde093a 4cc478a341796b5d2a362b448275be1791d1d666 6f142bca786f33aed4c4e1fe94d9738c0c519eba 3e47cbddffa138539098b3b4834caf34ba5f5b86 ae5aa8a3ef401907338b5dfb879a596116fa471a 26ff643937c0067d6f3b2502f1fff08cc5ae0234 5da1f7e25f47ec3d8530ec593058197ab4cf002d 428135125936bf4a181f060679c088c688adf418 cd94e9dcdc285bd3ac6ce0796d3f26feef856217 7f7c8e7a353e258552d75a3f29ecd50b30502311 bd9d960571aa175ee74c4080a3e30e02054c71d2 6e91c371 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:6c:6b:d0:f7:ed:5a:f5:04:41:1a:da:d8:90:25:83:f8:86:74:9b] modulus: 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 public exponent: 10001 ] 2021-11-15 03:34:08.965  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-15 03:34:08.968 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-15 03:34:08.969 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-15 03:34:08.970 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-15 03:34:08.970  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-15 03:34:08.971  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-15 03:34:08.971  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-15 03:34:08.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-15 03:34:08.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-15 03:34:08.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-15 03:34:08.977 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-15 03:34:08.977 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:34:08.978 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:34:09.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:34:09.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-15 03:34:09.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-15 03:34:09.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-15 03:34:09.358 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:34:09.363  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-15 03:34:09.364  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-15 03:34:09.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:34:09.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:34:09.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:34:09.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:34:09.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:34:09.368 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:34:09.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:34:09.373 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:34:09.373 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:34:09.458 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-15 03:34:09.465 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336533179640793221909354102753461990379235729328 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 15 01:38:22 UTC 2021 Final Date: Sat Nov 15 01:38:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:20:25:0b:cd:5a:dc:f2:8d:35:28:ae:e8:4c:23:62:2d:ec:1f:65] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98b182dfe975a6cb2446935d4e93a7c2c45ee6e3 79df9831dea333ecba52fe6c927a9a24731c1804 fd36de1da5be3ff8c650a71c902d87d74aab58c7 79f1fd13ae8a46b9f63a7d3d42eaca31082ab53b f96530de2ad232f9377978c10b88e5be400c7410 63c236929d10fbf328ac50899e473248698da33e 7392960433408a14d303a941662de507234b40cc 983dbd0abae5783bce6d061d0ad922a643b4a511 d4aabac1147416b943400b30276cba5e9fde093a 4cc478a341796b5d2a362b448275be1791d1d666 6f142bca786f33aed4c4e1fe94d9738c0c519eba 3e47cbddffa138539098b3b4834caf34ba5f5b86 ae5aa8a3ef401907338b5dfb879a596116fa471a 26ff643937c0067d6f3b2502f1fff08cc5ae0234 5da1f7e25f47ec3d8530ec593058197ab4cf002d 428135125936bf4a181f060679c088c688adf418 cd94e9dcdc285bd3ac6ce0796d3f26feef856217 7f7c8e7a353e258552d75a3f29ecd50b30502311 bd9d960571aa175ee74c4080a3e30e02054c71d2 6e91c371 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:ce:29:60:9a:7e:d7:cf:85:ee:83:25:69:ea:79:29:c4:76:39:a3] modulus: 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 public exponent: 10001 ] 2021-11-15 03:36:07.892  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-15 03:36:07.895 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-15 03:36:07.896 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-15 03:36:07.897 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-15 03:36:07.898  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-15 03:36:07.898  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-15 03:36:07.899  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-15 03:36:07.899 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-15 03:36:07.899 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-15 03:36:07.900 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-15 03:36:07.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-15 03:36:07.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:36:07.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:36:07.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:36:08.079  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-15 03:36:08.080  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-15 03:36:08.081 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-15 03:36:08.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:36:08.085  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-15 03:36:08.086  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-15 03:36:08.087 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:36:08.087 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:36:08.088 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:36:08.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:36:08.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:36:08.090 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:36:08.159 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:36:08.160 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:36:08.161 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:36:08.163 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-15 03:36:08.168 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336533179640793221909354102753461990379235729328 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 15 01:38:22 UTC 2021 Final Date: Sat Nov 15 01:38:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:20:25:0b:cd:5a:dc:f2:8d:35:28:ae:e8:4c:23:62:2d:ec:1f:65] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98b182dfe975a6cb2446935d4e93a7c2c45ee6e3 79df9831dea333ecba52fe6c927a9a24731c1804 fd36de1da5be3ff8c650a71c902d87d74aab58c7 79f1fd13ae8a46b9f63a7d3d42eaca31082ab53b f96530de2ad232f9377978c10b88e5be400c7410 63c236929d10fbf328ac50899e473248698da33e 7392960433408a14d303a941662de507234b40cc 983dbd0abae5783bce6d061d0ad922a643b4a511 d4aabac1147416b943400b30276cba5e9fde093a 4cc478a341796b5d2a362b448275be1791d1d666 6f142bca786f33aed4c4e1fe94d9738c0c519eba 3e47cbddffa138539098b3b4834caf34ba5f5b86 ae5aa8a3ef401907338b5dfb879a596116fa471a 26ff643937c0067d6f3b2502f1fff08cc5ae0234 5da1f7e25f47ec3d8530ec593058197ab4cf002d 428135125936bf4a181f060679c088c688adf418 cd94e9dcdc285bd3ac6ce0796d3f26feef856217 7f7c8e7a353e258552d75a3f29ecd50b30502311 bd9d960571aa175ee74c4080a3e30e02054c71d2 6e91c371 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:82:d8:50:29:fe:cc:1a:56:d2:d2:d2:c7:9b:c7:12:18:4a:f1:47] modulus: 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 public exponent: 10001 ] 2021-11-15 03:38:46.044  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-15 03:38:46.046 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-15 03:38:46.048 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-15 03:38:46.048 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-15 03:38:46.048  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-15 03:38:46.049  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-15 03:38:46.049  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-15 03:38:46.049 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-15 03:38:46.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-15 03:38:46.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-15 03:38:46.053 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-15 03:38:46.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:38:46.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:38:46.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:38:46.140  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-15 03:38:46.141  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-15 03:38:46.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-15 03:38:46.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:38:46.159  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-15 03:38:46.159  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-15 03:38:46.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:38:46.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:38:46.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:38:46.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:38:46.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:38:46.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:38:46.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:38:46.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:38:46.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:38:46.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-15 03:38:46.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336533179640793221909354102753461990379235729328 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 15 01:38:22 UTC 2021 Final Date: Sat Nov 15 01:38:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:20:25:0b:cd:5a:dc:f2:8d:35:28:ae:e8:4c:23:62:2d:ec:1f:65] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98b182dfe975a6cb2446935d4e93a7c2c45ee6e3 79df9831dea333ecba52fe6c927a9a24731c1804 fd36de1da5be3ff8c650a71c902d87d74aab58c7 79f1fd13ae8a46b9f63a7d3d42eaca31082ab53b f96530de2ad232f9377978c10b88e5be400c7410 63c236929d10fbf328ac50899e473248698da33e 7392960433408a14d303a941662de507234b40cc 983dbd0abae5783bce6d061d0ad922a643b4a511 d4aabac1147416b943400b30276cba5e9fde093a 4cc478a341796b5d2a362b448275be1791d1d666 6f142bca786f33aed4c4e1fe94d9738c0c519eba 3e47cbddffa138539098b3b4834caf34ba5f5b86 ae5aa8a3ef401907338b5dfb879a596116fa471a 26ff643937c0067d6f3b2502f1fff08cc5ae0234 5da1f7e25f47ec3d8530ec593058197ab4cf002d 428135125936bf4a181f060679c088c688adf418 cd94e9dcdc285bd3ac6ce0796d3f26feef856217 7f7c8e7a353e258552d75a3f29ecd50b30502311 bd9d960571aa175ee74c4080a3e30e02054c71d2 6e91c371 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:8e:60:49:fa:27:28:46:12:8c:dc:9a:32:69:ae:7b:c1:4d:96:b4] modulus: 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 public exponent: 10001 ] 2021-11-15 03:38:58.389  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-15 03:38:58.390 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-15 03:38:58.392 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-15 03:38:58.392 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-15 03:38:58.392  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-15 03:38:58.393  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-15 03:38:58.393  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-15 03:38:58.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-15 03:38:58.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-15 03:38:58.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-15 03:38:58.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-15 03:38:58.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:38:58.461 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:38:58.461 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:38:58.545  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-15 03:38:58.558  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-15 03:38:58.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-15 03:38:58.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:38:58.562  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-15 03:38:58.562  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-15 03:38:58.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:38:58.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:38:58.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:38:58.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:38:58.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:38:58.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:38:58.565 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:38:58.565 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:38:58.565 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:38:58.566 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-15 03:38:58.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336533179640793221909354102753461990379235729328 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 15 01:38:22 UTC 2021 Final Date: Sat Nov 15 01:38:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:20:25:0b:cd:5a:dc:f2:8d:35:28:ae:e8:4c:23:62:2d:ec:1f:65] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98b182dfe975a6cb2446935d4e93a7c2c45ee6e3 79df9831dea333ecba52fe6c927a9a24731c1804 fd36de1da5be3ff8c650a71c902d87d74aab58c7 79f1fd13ae8a46b9f63a7d3d42eaca31082ab53b f96530de2ad232f9377978c10b88e5be400c7410 63c236929d10fbf328ac50899e473248698da33e 7392960433408a14d303a941662de507234b40cc 983dbd0abae5783bce6d061d0ad922a643b4a511 d4aabac1147416b943400b30276cba5e9fde093a 4cc478a341796b5d2a362b448275be1791d1d666 6f142bca786f33aed4c4e1fe94d9738c0c519eba 3e47cbddffa138539098b3b4834caf34ba5f5b86 ae5aa8a3ef401907338b5dfb879a596116fa471a 26ff643937c0067d6f3b2502f1fff08cc5ae0234 5da1f7e25f47ec3d8530ec593058197ab4cf002d 428135125936bf4a181f060679c088c688adf418 cd94e9dcdc285bd3ac6ce0796d3f26feef856217 7f7c8e7a353e258552d75a3f29ecd50b30502311 bd9d960571aa175ee74c4080a3e30e02054c71d2 6e91c371 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:cb:4b:e9:12:53:0b:03:81:a9:39:3a:e2:2e:f6:88:b6:40:75:76] modulus: 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 public exponent: 10001 ] 2021-11-15 03:39:18.270  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-15 03:39:18.271 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-15 03:39:18.272 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-15 03:39:18.273 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-15 03:39:18.273  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-15 03:39:18.273  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-15 03:39:18.274  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-15 03:39:18.274 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-15 03:39:18.274 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-15 03:39:18.274 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-15 03:39:18.281 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-15 03:39:18.281 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:39:18.281 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:39:18.282 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:39:18.375  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-15 03:39:18.376  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-15 03:39:18.376 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-15 03:39:18.376 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:39:18.377  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-15 03:39:18.377  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-15 03:39:18.378 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:39:18.378 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:39:18.378 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:39:18.378 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:39:18.378 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:39:18.379 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:39:18.379 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:39:18.379 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:39:18.379 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:39:18.380 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-15 03:39:18.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336533179640793221909354102753461990379235729328 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 15 01:38:22 UTC 2021 Final Date: Sat Nov 15 01:38:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:20:25:0b:cd:5a:dc:f2:8d:35:28:ae:e8:4c:23:62:2d:ec:1f:65] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98b182dfe975a6cb2446935d4e93a7c2c45ee6e3 79df9831dea333ecba52fe6c927a9a24731c1804 fd36de1da5be3ff8c650a71c902d87d74aab58c7 79f1fd13ae8a46b9f63a7d3d42eaca31082ab53b f96530de2ad232f9377978c10b88e5be400c7410 63c236929d10fbf328ac50899e473248698da33e 7392960433408a14d303a941662de507234b40cc 983dbd0abae5783bce6d061d0ad922a643b4a511 d4aabac1147416b943400b30276cba5e9fde093a 4cc478a341796b5d2a362b448275be1791d1d666 6f142bca786f33aed4c4e1fe94d9738c0c519eba 3e47cbddffa138539098b3b4834caf34ba5f5b86 ae5aa8a3ef401907338b5dfb879a596116fa471a 26ff643937c0067d6f3b2502f1fff08cc5ae0234 5da1f7e25f47ec3d8530ec593058197ab4cf002d 428135125936bf4a181f060679c088c688adf418 cd94e9dcdc285bd3ac6ce0796d3f26feef856217 7f7c8e7a353e258552d75a3f29ecd50b30502311 bd9d960571aa175ee74c4080a3e30e02054c71d2 6e91c371 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:01:f4:e1:d0:e6:29:b4:28:f4:55:19:a5:88:a0:79:8d:b1:7c:2c] modulus: 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 public exponent: 10001 ] 2021-11-15 03:39:54.770  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-15 03:39:54.771 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-15 03:39:54.773 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-15 03:39:54.773 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-15 03:39:54.774  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-15 03:39:54.775  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-15 03:39:54.775  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-15 03:39:54.775 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-15 03:39:54.776 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-15 03:39:54.776 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-15 03:39:54.780 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-15 03:39:54.780 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:39:54.780 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:39:54.780 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:39:54.958  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-15 03:39:54.958  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-15 03:39:54.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-15 03:39:54.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:39:54.963  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-15 03:39:54.964  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-15 03:39:54.964 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:39:54.965 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:39:54.965 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:39:54.966 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:39:54.967 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:39:54.967 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:39:54.968 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:39:54.968 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:39:54.968 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:39:54.969 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-15 03:39:54.971 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336533179640793221909354102753461990379235729328 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 15 01:38:22 UTC 2021 Final Date: Sat Nov 15 01:38:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:20:25:0b:cd:5a:dc:f2:8d:35:28:ae:e8:4c:23:62:2d:ec:1f:65] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98b182dfe975a6cb2446935d4e93a7c2c45ee6e3 79df9831dea333ecba52fe6c927a9a24731c1804 fd36de1da5be3ff8c650a71c902d87d74aab58c7 79f1fd13ae8a46b9f63a7d3d42eaca31082ab53b f96530de2ad232f9377978c10b88e5be400c7410 63c236929d10fbf328ac50899e473248698da33e 7392960433408a14d303a941662de507234b40cc 983dbd0abae5783bce6d061d0ad922a643b4a511 d4aabac1147416b943400b30276cba5e9fde093a 4cc478a341796b5d2a362b448275be1791d1d666 6f142bca786f33aed4c4e1fe94d9738c0c519eba 3e47cbddffa138539098b3b4834caf34ba5f5b86 ae5aa8a3ef401907338b5dfb879a596116fa471a 26ff643937c0067d6f3b2502f1fff08cc5ae0234 5da1f7e25f47ec3d8530ec593058197ab4cf002d 428135125936bf4a181f060679c088c688adf418 cd94e9dcdc285bd3ac6ce0796d3f26feef856217 7f7c8e7a353e258552d75a3f29ecd50b30502311 bd9d960571aa175ee74c4080a3e30e02054c71d2 6e91c371 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:d2:d0:ed:59:7c:be:e3:28:bb:e3:b1:f9:17:21:6b:d9:fc:64:53] modulus: cb5d09a2cf09fb23f3818b6780cf2369fc3f1784fd91acf2cfc0e8cea6da4d998503bd17a136c1b1ad3cec4432695c7ec28733d1edcab8cae3faf7c5c75b838f1a30b4f6de0f2c5e2ab53e29e06c5424ebbcab502b7007845464201bc44e1d4e3cc5a16ae20b008375c96ba5b8506fa90ba2abd8d8c64385f08b451a178d0a0dacd406f79a046a0c0a6c7e67c77db321acbf65a6a0d42da506e002e5829ad21fb4a1f70ad34394b0dede708cf2f4f9849266942241a1d00271229a289f0c6ccfa1b415b15f09998c79b3991716da511c139386a273f06f0ed36a2033fbc21152e2febecfd799356003168de86a3b46fb139c70c1d3825bb9fbccb7f2600f3739 public exponent: 10001 ] 2021-11-15 03:41:31.675  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-15 03:41:31.676 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-15 03:41:31.677 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-15 03:41:31.677 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-15 03:41:31.678  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-15 03:41:31.678  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-15 03:41:31.678  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-15 03:41:31.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-15 03:41:31.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-15 03:41:31.679 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-15 03:41:31.682 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-15 03:41:31.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:41:31.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:41:31.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:41:31.776  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-15 03:41:31.776  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-15 03:41:31.777 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-15 03:41:31.777 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:41:31.779  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-15 03:41:31.780  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-15 03:41:31.780 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:41:31.780 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:41:31.781 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:41:31.781 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:41:31.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:41:31.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:41:31.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:41:31.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:41:31.784 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:41:31.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-15 03:41:31.861 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336533179640793221909354102753461990379235729328 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 15 01:38:22 UTC 2021 Final Date: Sat Nov 15 01:38:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:20:25:0b:cd:5a:dc:f2:8d:35:28:ae:e8:4c:23:62:2d:ec:1f:65] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98b182dfe975a6cb2446935d4e93a7c2c45ee6e3 79df9831dea333ecba52fe6c927a9a24731c1804 fd36de1da5be3ff8c650a71c902d87d74aab58c7 79f1fd13ae8a46b9f63a7d3d42eaca31082ab53b f96530de2ad232f9377978c10b88e5be400c7410 63c236929d10fbf328ac50899e473248698da33e 7392960433408a14d303a941662de507234b40cc 983dbd0abae5783bce6d061d0ad922a643b4a511 d4aabac1147416b943400b30276cba5e9fde093a 4cc478a341796b5d2a362b448275be1791d1d666 6f142bca786f33aed4c4e1fe94d9738c0c519eba 3e47cbddffa138539098b3b4834caf34ba5f5b86 ae5aa8a3ef401907338b5dfb879a596116fa471a 26ff643937c0067d6f3b2502f1fff08cc5ae0234 5da1f7e25f47ec3d8530ec593058197ab4cf002d 428135125936bf4a181f060679c088c688adf418 cd94e9dcdc285bd3ac6ce0796d3f26feef856217 7f7c8e7a353e258552d75a3f29ecd50b30502311 bd9d960571aa175ee74c4080a3e30e02054c71d2 6e91c371 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:89:1e:89:5f:a6:9b:51:a9:d6:88:2e:44:e3:a3:c6:7f:09:64:62] modulus: d1f05b07f37f3e05f903ec16632850ae60e21a9f046d43159ee45ff65f296d41176550d1aef012d6fe58a062a56e03a28cbc510c8996df54638269845027039193c563f6c46f38f47cb9ebcadec53af5a7dd9aa9677fc088db98f67937289d58370981124650190e13138a57d17c7a52b85a4bb4020972f5131e0a900ead8dafe045ddfbafe18deaa8e451b8dd3c54a159a374a57acf32aab760dab98949d16a7f55a079a08937002d7ea44ec3361d7466822adb4acb31892263b88db226304960562b3ace57a670b1d04e87ab44821f9b956d02c87de21c337bf894d984b7ae5a5c1dc473f7c1409f863beb0a65219f1dacd13bdea7e5a083c37016695539df public exponent: 10001 ] 2021-11-15 03:41:57.401  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-15 03:41:57.402 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-15 03:41:57.404 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-15 03:41:57.404 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-15 03:41:57.405  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-15 03:41:57.405  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-15 03:41:57.406  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-15 03:41:57.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-15 03:41:57.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-15 03:41:57.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-15 03:41:57.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-15 03:41:57.412 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:41:57.412 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-15 03:41:57.412 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:41:57.522  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-15 03:41:57.523  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-15 03:41:57.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-15 03:41:57.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-15 03:41:57.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-15 03:41:57.559  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-15 03:41:57.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:41:57.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:41:57.561 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:41:57.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:41:57.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:41:57.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:41:57.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-15 03:41:57.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-15 03:41:57.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-15 03:41:57.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-15 03:41:57.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 336533179640793221909354102753461990379235729328 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 15 01:38:22 UTC 2021 Final Date: Sat Nov 15 01:38:21 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fb:20:25:0b:cd:5a:dc:f2:8d:35:28:ae:e8:4c:23:62:2d:ec:1f:65] modulus: a9acfa1147ab1ef70c2bc99e5be7f4b437d15b9652fdc334de875a1b083f89fe8c0e05582b0c69bebd994397651eea53b24f19847360b872e25dacdb921fb95ba9a85bd6a7bca4ea0231c51af5909c29c750aa3f0acb7ef7e5456e369b3478aa4e6052a1d95ac99393fb88820d5798e2834c40edc63f0bec57a3a272ffc45f0540814bed0adfb4e1a37879dbbda9b42f9696bf9f194ec88e09994cc19ef79e2dc3349576bd0c019ba8d5b10ababac8c9c9922347aacd86e2de97c9769c1c7fca45154c440be939c849fa4ab8b639ff28f8744e0f964786d30cfe33cee0270583d99a7d3892e1025a9f45f18d1ebd50ee7374d22a67e2745a9f6c71a46bbf020c4277468b94e9483ada9e7afa59b72c623d363f38b783415adabfad31882f1d60c8a02f5d895673b1b703acbce10d0053ff674b9ad16df67a495e1b8adc508a25154bf54918d86fa2ed07decda0c64d3ddc81d7b29967c25e7664a1bb7434c46035776b7f8485778bae2507f0d30e3d7f21491da3eaa5546da86b95f3367e423d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 98b182dfe975a6cb2446935d4e93a7c2c45ee6e3 79df9831dea333ecba52fe6c927a9a24731c1804 fd36de1da5be3ff8c650a71c902d87d74aab58c7 79f1fd13ae8a46b9f63a7d3d42eaca31082ab53b f96530de2ad232f9377978c10b88e5be400c7410 63c236929d10fbf328ac50899e473248698da33e 7392960433408a14d303a941662de507234b40cc 983dbd0abae5783bce6d061d0ad922a643b4a511 d4aabac1147416b943400b30276cba5e9fde093a 4cc478a341796b5d2a362b448275be1791d1d666 6f142bca786f33aed4c4e1fe94d9738c0c519eba 3e47cbddffa138539098b3b4834caf34ba5f5b86 ae5aa8a3ef401907338b5dfb879a596116fa471a 26ff643937c0067d6f3b2502f1fff08cc5ae0234 5da1f7e25f47ec3d8530ec593058197ab4cf002d 428135125936bf4a181f060679c088c688adf418 cd94e9dcdc285bd3ac6ce0796d3f26feef856217 7f7c8e7a353e258552d75a3f29ecd50b30502311 bd9d960571aa175ee74c4080a3e30e02054c71d2 6e91c371 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:8f:da:64:12:da:a4:ad:79:47:9d:81:99:63:56:07:17:0a:9a:7c] modulus: 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 public exponent: 10001 ]