2021-11-26 01:25:28,023 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-11-26 01:25:32,537 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-11-26 01:25:35.723  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-11-26 01:25:50.320 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-11-26 01:25:51.831  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-11-26 01:25:52.622  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-11-26 01:26:05.432  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 39.715 seconds (JVM running for 47.377) 2021-11-26 01:26:28.426  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-26 01:26:28.528 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-26 01:26:29.117 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-26 01:26:29.122 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-26 01:26:29.314  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-11-26 01:26:29.319  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-26 01:26:29.320  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-26 01:26:29.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-26 01:26:29.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 01:26:29.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-26 01:26:29.422 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-26 01:26:29.425 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-26 01:26:29.727 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-26 01:26:29.732 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 01:26:29.733 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 01:26:29.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 01:26:31.173  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-26 01:26:31.175  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-26 01:26:31.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-26 01:26:31.177 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 01:26:31.228  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-26 01:26:31.230  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-26 01:26:31.232 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 01:26:31.233 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 01:26:31.233 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 01:26:31.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 01:26:31.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 01:26:31.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 01:26:31.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 01:26:31.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 01:26:31.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 01:26:31.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-26 01:26:31.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250071544268420660353573439958167047160184149585 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 26 01:21:45 UTC 2021 Final Date: Wed Nov 26 01:21:44 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9c:29:4f:91:04:d2:05:9d:92:5e:7f:4e:5d:ba:d3:83:da:12:80:70] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16529e897d3a7fa5b1ec57dd78dfdc4939d3bd94 b8b4ba4250a2860f84cb8eedfdc72eeef21b004f bc5a22853871b530d704428e7b89a47a7b58fba0 a6baca7e3c5b491d8be2b2bb9588fc2b0f39c581 ca672f2d635df9174d23927c426b86e87c385fd2 8b4289698ff17a25bff70df2a302c4c71dbaebd7 d65b87efa01ce53639c7cc1bda2f316246b60506 def3d7f8c42b00b8190541d2ecc02acc5832c270 17f5b910184fb9a825bf8844ed0e46daff461bbc 3e8f0ec8109ed562eab24d4b68b6a5951bc9bf92 bbbee11eea9d4a23c707a362e0615503d2988047 b1d7411565ed4bb15624ae51683f84f52df59841 c40d5785eecfc6b96bfc1ed53f7dd9e700ef7845 178688f8743101809cc4a25758547259cd743c78 244d00459705fe8eb6d861aa484dc722a720d1ce 39960376cc9ca500291adeec79ee4d5daef39644 1ee833b2b4784b17d413c5262472d825890d594e 4e5b2d6fc00aae9a041848b9e8fda4dc43dabc7b bf00ad220945e8eee94216cd88dd2f6b58a56d14 f1d8a74b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:b9:1d:45:a1:06:fd:43:eb:15:95:85:48:3d:b5:f3:90:f4:42:fa] modulus: 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 public exponent: 10001 ] 2021-11-26 02:50:14.101  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-26 02:50:14.102 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-26 02:50:14.104 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-26 02:50:14.105 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-26 02:50:14.130  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-26 02:50:14.131  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-26 02:50:14.131  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-26 02:50:14.131 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-26 02:50:14.132 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-26 02:50:14.132 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-26 02:50:14.139 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-26 02:50:14.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:50:14.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:50:14.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:50:14.427  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-26 02:50:14.428  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-26 02:50:14.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-26 02:50:14.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:50:14.431  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-26 02:50:14.432  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-26 02:50:14.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:50:14.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:50:14.433 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:50:14.434 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:50:14.434 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:50:14.434 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:50:14.435 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:50:14.435 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:50:14.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:50:14.437 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-26 02:50:14.440 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250071544268420660353573439958167047160184149585 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 26 01:21:45 UTC 2021 Final Date: Wed Nov 26 01:21:44 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9c:29:4f:91:04:d2:05:9d:92:5e:7f:4e:5d:ba:d3:83:da:12:80:70] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16529e897d3a7fa5b1ec57dd78dfdc4939d3bd94 b8b4ba4250a2860f84cb8eedfdc72eeef21b004f bc5a22853871b530d704428e7b89a47a7b58fba0 a6baca7e3c5b491d8be2b2bb9588fc2b0f39c581 ca672f2d635df9174d23927c426b86e87c385fd2 8b4289698ff17a25bff70df2a302c4c71dbaebd7 d65b87efa01ce53639c7cc1bda2f316246b60506 def3d7f8c42b00b8190541d2ecc02acc5832c270 17f5b910184fb9a825bf8844ed0e46daff461bbc 3e8f0ec8109ed562eab24d4b68b6a5951bc9bf92 bbbee11eea9d4a23c707a362e0615503d2988047 b1d7411565ed4bb15624ae51683f84f52df59841 c40d5785eecfc6b96bfc1ed53f7dd9e700ef7845 178688f8743101809cc4a25758547259cd743c78 244d00459705fe8eb6d861aa484dc722a720d1ce 39960376cc9ca500291adeec79ee4d5daef39644 1ee833b2b4784b17d413c5262472d825890d594e 4e5b2d6fc00aae9a041848b9e8fda4dc43dabc7b bf00ad220945e8eee94216cd88dd2f6b58a56d14 f1d8a74b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:36:7a:f1:55:65:0f:2e:11:70:65:87:97:e2:fd:9f:de:7e:12:34] modulus: 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 public exponent: 10001 ] 2021-11-26 02:52:35.165  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-26 02:52:35.166 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-26 02:52:35.167 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-26 02:52:35.167 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-26 02:52:35.168  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-11-26 02:52:35.169  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-26 02:52:35.169  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-26 02:52:35.169 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-26 02:52:35.169 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-26 02:52:35.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-26 02:52:35.176 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-26 02:52:35.177 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:52:35.215 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:52:35.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:52:35.315  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-26 02:52:35.317  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-26 02:52:35.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-26 02:52:35.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:52:35.322  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-26 02:52:35.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-26 02:52:35.323 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:52:35.324 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:52:35.324 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:52:35.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:52:35.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:52:35.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:52:35.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:52:35.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:52:35.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:52:35.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-26 02:52:35.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250071544268420660353573439958167047160184149585 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 26 01:21:45 UTC 2021 Final Date: Wed Nov 26 01:21:44 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9c:29:4f:91:04:d2:05:9d:92:5e:7f:4e:5d:ba:d3:83:da:12:80:70] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16529e897d3a7fa5b1ec57dd78dfdc4939d3bd94 b8b4ba4250a2860f84cb8eedfdc72eeef21b004f bc5a22853871b530d704428e7b89a47a7b58fba0 a6baca7e3c5b491d8be2b2bb9588fc2b0f39c581 ca672f2d635df9174d23927c426b86e87c385fd2 8b4289698ff17a25bff70df2a302c4c71dbaebd7 d65b87efa01ce53639c7cc1bda2f316246b60506 def3d7f8c42b00b8190541d2ecc02acc5832c270 17f5b910184fb9a825bf8844ed0e46daff461bbc 3e8f0ec8109ed562eab24d4b68b6a5951bc9bf92 bbbee11eea9d4a23c707a362e0615503d2988047 b1d7411565ed4bb15624ae51683f84f52df59841 c40d5785eecfc6b96bfc1ed53f7dd9e700ef7845 178688f8743101809cc4a25758547259cd743c78 244d00459705fe8eb6d861aa484dc722a720d1ce 39960376cc9ca500291adeec79ee4d5daef39644 1ee833b2b4784b17d413c5262472d825890d594e 4e5b2d6fc00aae9a041848b9e8fda4dc43dabc7b bf00ad220945e8eee94216cd88dd2f6b58a56d14 f1d8a74b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:95:da:fb:ef:6c:34:56:9b:44:43:9a:2c:3a:a0:b6:48:f3:dc:33] modulus: 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 public exponent: 10001 ] 2021-11-26 02:53:25.564  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-26 02:53:25.566 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-26 02:53:25.568 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-26 02:53:25.568 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-26 02:53:25.569  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-26 02:53:25.569  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-26 02:53:25.570  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-26 02:53:25.570 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-26 02:53:25.570 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-26 02:53:25.570 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-26 02:53:25.574 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-26 02:53:25.575 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:53:25.575 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:53:25.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:53:25.739  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-26 02:53:25.740  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-26 02:53:25.741 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-26 02:53:25.741 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:53:25.743  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-26 02:53:25.744  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-26 02:53:25.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:53:25.745 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:53:25.745 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:53:25.746 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:53:25.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:53:25.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:53:25.755 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:53:25.755 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:53:25.755 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:53:25.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-26 02:53:25.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250071544268420660353573439958167047160184149585 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 26 01:21:45 UTC 2021 Final Date: Wed Nov 26 01:21:44 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9c:29:4f:91:04:d2:05:9d:92:5e:7f:4e:5d:ba:d3:83:da:12:80:70] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16529e897d3a7fa5b1ec57dd78dfdc4939d3bd94 b8b4ba4250a2860f84cb8eedfdc72eeef21b004f bc5a22853871b530d704428e7b89a47a7b58fba0 a6baca7e3c5b491d8be2b2bb9588fc2b0f39c581 ca672f2d635df9174d23927c426b86e87c385fd2 8b4289698ff17a25bff70df2a302c4c71dbaebd7 d65b87efa01ce53639c7cc1bda2f316246b60506 def3d7f8c42b00b8190541d2ecc02acc5832c270 17f5b910184fb9a825bf8844ed0e46daff461bbc 3e8f0ec8109ed562eab24d4b68b6a5951bc9bf92 bbbee11eea9d4a23c707a362e0615503d2988047 b1d7411565ed4bb15624ae51683f84f52df59841 c40d5785eecfc6b96bfc1ed53f7dd9e700ef7845 178688f8743101809cc4a25758547259cd743c78 244d00459705fe8eb6d861aa484dc722a720d1ce 39960376cc9ca500291adeec79ee4d5daef39644 1ee833b2b4784b17d413c5262472d825890d594e 4e5b2d6fc00aae9a041848b9e8fda4dc43dabc7b bf00ad220945e8eee94216cd88dd2f6b58a56d14 f1d8a74b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:c1:2b:18:fd:33:ad:40:16:9b:26:f7:1b:07:64:78:9c:2f:d3:5a] modulus: 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 public exponent: 10001 ] 2021-11-26 02:55:38.360  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-26 02:55:38.361 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-26 02:55:38.362 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-26 02:55:38.362 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-26 02:55:38.362  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-11-26 02:55:38.363  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-26 02:55:38.363  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-26 02:55:38.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-26 02:55:38.363 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-26 02:55:38.364 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-26 02:55:38.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-26 02:55:38.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:55:38.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:55:38.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:55:38.449  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-26 02:55:38.450  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-26 02:55:38.450 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-26 02:55:38.450 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:55:38.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-26 02:55:38.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-26 02:55:38.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:55:38.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:55:38.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:55:38.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:55:38.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:55:38.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:55:38.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:55:38.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:55:38.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:55:38.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-26 02:55:38.519 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250071544268420660353573439958167047160184149585 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 26 01:21:45 UTC 2021 Final Date: Wed Nov 26 01:21:44 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9c:29:4f:91:04:d2:05:9d:92:5e:7f:4e:5d:ba:d3:83:da:12:80:70] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16529e897d3a7fa5b1ec57dd78dfdc4939d3bd94 b8b4ba4250a2860f84cb8eedfdc72eeef21b004f bc5a22853871b530d704428e7b89a47a7b58fba0 a6baca7e3c5b491d8be2b2bb9588fc2b0f39c581 ca672f2d635df9174d23927c426b86e87c385fd2 8b4289698ff17a25bff70df2a302c4c71dbaebd7 d65b87efa01ce53639c7cc1bda2f316246b60506 def3d7f8c42b00b8190541d2ecc02acc5832c270 17f5b910184fb9a825bf8844ed0e46daff461bbc 3e8f0ec8109ed562eab24d4b68b6a5951bc9bf92 bbbee11eea9d4a23c707a362e0615503d2988047 b1d7411565ed4bb15624ae51683f84f52df59841 c40d5785eecfc6b96bfc1ed53f7dd9e700ef7845 178688f8743101809cc4a25758547259cd743c78 244d00459705fe8eb6d861aa484dc722a720d1ce 39960376cc9ca500291adeec79ee4d5daef39644 1ee833b2b4784b17d413c5262472d825890d594e 4e5b2d6fc00aae9a041848b9e8fda4dc43dabc7b bf00ad220945e8eee94216cd88dd2f6b58a56d14 f1d8a74b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:2f:64:37:39:3e:7a:d8:2b:2c:d0:25:61:fa:0a:76:cf:31:61:40] modulus: d0a80fcc7fd76e70017afcf9bca30097ab9ea70e441d67ea16c6066c4f37916055bba558cdc588f071d74768691d831366a14d118c197effa5d2b214f63db5c3eb777a8478522df3e5e27988baafa40b2dde673a26e1f41ce139b71e00a636bd162639874bd750311e56cd2ad39d47aeff16af6ba742f48d61b9e7b7cba62f6f18243d758440abca2b78cffb895fdc6e9b636954431a96f4614d3436b571cbb19ea1ea289f19cab29baa82d57d3908247794f868c3a1b5a72a100272491ce372ed993da59b57084d69834b646ccc8c55f3d3795bef8006dc1a2082c9ef71237bcb9c197e47e1ce85e5a9983301fbbd4280db89dbf2dd5a2ceb0013be28e8fa57 public exponent: 10001 ] 2021-11-26 02:57:10.306  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-26 02:57:10.307 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-26 02:57:10.308 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-26 02:57:10.309 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-26 02:57:10.309  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-11-26 02:57:10.310  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-26 02:57:10.310  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-26 02:57:10.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-26 02:57:10.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-26 02:57:10.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-26 02:57:10.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-26 02:57:10.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:57:10.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:57:10.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:57:10.415  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-26 02:57:10.416  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-26 02:57:10.417 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-26 02:57:10.417 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:57:10.421  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-26 02:57:10.424  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-26 02:57:10.424 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:57:10.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:57:10.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:57:10.428 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:57:10.428 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:57:10.428 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:57:10.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:57:10.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:57:10.429 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:57:10.430 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-26 02:57:10.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250071544268420660353573439958167047160184149585 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 26 01:21:45 UTC 2021 Final Date: Wed Nov 26 01:21:44 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9c:29:4f:91:04:d2:05:9d:92:5e:7f:4e:5d:ba:d3:83:da:12:80:70] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16529e897d3a7fa5b1ec57dd78dfdc4939d3bd94 b8b4ba4250a2860f84cb8eedfdc72eeef21b004f bc5a22853871b530d704428e7b89a47a7b58fba0 a6baca7e3c5b491d8be2b2bb9588fc2b0f39c581 ca672f2d635df9174d23927c426b86e87c385fd2 8b4289698ff17a25bff70df2a302c4c71dbaebd7 d65b87efa01ce53639c7cc1bda2f316246b60506 def3d7f8c42b00b8190541d2ecc02acc5832c270 17f5b910184fb9a825bf8844ed0e46daff461bbc 3e8f0ec8109ed562eab24d4b68b6a5951bc9bf92 bbbee11eea9d4a23c707a362e0615503d2988047 b1d7411565ed4bb15624ae51683f84f52df59841 c40d5785eecfc6b96bfc1ed53f7dd9e700ef7845 178688f8743101809cc4a25758547259cd743c78 244d00459705fe8eb6d861aa484dc722a720d1ce 39960376cc9ca500291adeec79ee4d5daef39644 1ee833b2b4784b17d413c5262472d825890d594e 4e5b2d6fc00aae9a041848b9e8fda4dc43dabc7b bf00ad220945e8eee94216cd88dd2f6b58a56d14 f1d8a74b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:37:d0:c5:7f:5e:62:f6:3b:45:27:ec:76:b7:98:39:68:83:f4:e8] modulus: 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 public exponent: 10001 ] 2021-11-26 02:57:39.229  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-26 02:57:39.230 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-26 02:57:39.231 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-26 02:57:39.232 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-26 02:57:39.232  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-11-26 02:57:39.233  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-26 02:57:39.233  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-26 02:57:39.233 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-26 02:57:39.234 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-26 02:57:39.234 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-26 02:57:39.240 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-26 02:57:39.240 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:57:39.240 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:57:39.240 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:57:39.320  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-26 02:57:39.321  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-26 02:57:39.321 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-26 02:57:39.322 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:57:39.323  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-26 02:57:39.324  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-26 02:57:39.324 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:57:39.324 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:57:39.325 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:57:39.325 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:57:39.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:57:39.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:57:39.327 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:57:39.327 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:57:39.327 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:57:39.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-26 02:57:39.331 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250071544268420660353573439958167047160184149585 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 26 01:21:45 UTC 2021 Final Date: Wed Nov 26 01:21:44 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9c:29:4f:91:04:d2:05:9d:92:5e:7f:4e:5d:ba:d3:83:da:12:80:70] modulus: f095634faf0fcb503682436092d28c8f1d841497f547a1a9cf741dce47cdb599150c8e82d9b271c5020405371347f85c3a9cf5eb4c5a889d8d7173b159021c7229c3852f8a15ac9606cc052f76c14c298f5640bda41e2a61396a45797b9549991a2987530496a4bb4a27791afdc26ffd1408574dd4304483aea5fcfb2fb4fa8cd84c09922044d4bd4a4e1487862031d846dd51671df1f0db59f72d6d4064583d7295e60dfb74ff6bd75523ccf1d868ca07c5f014581ed1243e05dd1fd8396bd870e628cad2ecd20634eb8205c819305f4ef98fe0c676e0526ca912e7f3e3fb6aefb120ba909ba8e55b16ca627ddd8c85cb7f0cba44aa00daf661232607bd936c10484a5fa8c0cc485e22f3238a6083bfade2d1d9e3fa968b17dc0214eac206801ff19fd8a44fb632902673e6643d6b8ecac90560db3b68f22c5a7d9d436fb996793df12eb11f7387ccfc0b19299b9b893ee683d9afd1371ea9b65cb5b2833d642170ded8c5e13e047781b25c233457e1f4a77d72d9ce33c982049f2c02b724cf public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16529e897d3a7fa5b1ec57dd78dfdc4939d3bd94 b8b4ba4250a2860f84cb8eedfdc72eeef21b004f bc5a22853871b530d704428e7b89a47a7b58fba0 a6baca7e3c5b491d8be2b2bb9588fc2b0f39c581 ca672f2d635df9174d23927c426b86e87c385fd2 8b4289698ff17a25bff70df2a302c4c71dbaebd7 d65b87efa01ce53639c7cc1bda2f316246b60506 def3d7f8c42b00b8190541d2ecc02acc5832c270 17f5b910184fb9a825bf8844ed0e46daff461bbc 3e8f0ec8109ed562eab24d4b68b6a5951bc9bf92 bbbee11eea9d4a23c707a362e0615503d2988047 b1d7411565ed4bb15624ae51683f84f52df59841 c40d5785eecfc6b96bfc1ed53f7dd9e700ef7845 178688f8743101809cc4a25758547259cd743c78 244d00459705fe8eb6d861aa484dc722a720d1ce 39960376cc9ca500291adeec79ee4d5daef39644 1ee833b2b4784b17d413c5262472d825890d594e 4e5b2d6fc00aae9a041848b9e8fda4dc43dabc7b bf00ad220945e8eee94216cd88dd2f6b58a56d14 f1d8a74b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:ec:f7:f2:e8:78:d7:14:8e:ba:e1:7c:3f:97:2d:d6:70:03:bb:86] modulus: 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 public exponent: 10001 ] 2021-11-26 02:58:12.200  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-26 02:58:12.201 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-26 02:58:12.203 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-26 02:58:12.204 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-26 02:58:12.204  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-11-26 02:58:12.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-26 02:58:12.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-26 02:58:12.205 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-26 02:58:12.205 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-26 02:58:12.205 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-26 02:58:12.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-26 02:58:12.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:58:12.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 02:58:12.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:58:12.301  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-26 02:58:12.301  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-26 02:58:12.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-26 02:58:12.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 02:58:12.303  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-26 02:58:12.303  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-26 02:58:12.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:58:12.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:58:12.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:58:12.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:58:12.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:58:12.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:58:12.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 02:58:12.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 02:58:12.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 02:58:12.306 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-26 02:58:12.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250071544268420660353573439958167047160184149585 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 26 01:21:45 UTC 2021 Final Date: Wed Nov 26 01:21:44 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9c:29:4f:91:04:d2:05:9d:92:5e:7f:4e:5d:ba:d3:83:da:12:80:70] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16529e897d3a7fa5b1ec57dd78dfdc4939d3bd94 b8b4ba4250a2860f84cb8eedfdc72eeef21b004f bc5a22853871b530d704428e7b89a47a7b58fba0 a6baca7e3c5b491d8be2b2bb9588fc2b0f39c581 ca672f2d635df9174d23927c426b86e87c385fd2 8b4289698ff17a25bff70df2a302c4c71dbaebd7 d65b87efa01ce53639c7cc1bda2f316246b60506 def3d7f8c42b00b8190541d2ecc02acc5832c270 17f5b910184fb9a825bf8844ed0e46daff461bbc 3e8f0ec8109ed562eab24d4b68b6a5951bc9bf92 bbbee11eea9d4a23c707a362e0615503d2988047 b1d7411565ed4bb15624ae51683f84f52df59841 c40d5785eecfc6b96bfc1ed53f7dd9e700ef7845 178688f8743101809cc4a25758547259cd743c78 244d00459705fe8eb6d861aa484dc722a720d1ce 39960376cc9ca500291adeec79ee4d5daef39644 1ee833b2b4784b17d413c5262472d825890d594e 4e5b2d6fc00aae9a041848b9e8fda4dc43dabc7b bf00ad220945e8eee94216cd88dd2f6b58a56d14 f1d8a74b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [34:65:c3:44:4e:e0:74:a8:de:52:97:b8:70:3f:9f:37:8b:75:47:47] modulus: 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 public exponent: 10001 ] 2021-11-26 03:00:18.462  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-11-26 03:00:18.463 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-11-26 03:00:18.464 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-26 03:00:18.465 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-11-26 03:00:18.465  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-11-26 03:00:18.465  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-11-26 03:00:18.465  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-11-26 03:00:18.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-11-26 03:00:18.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-11-26 03:00:18.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-11-26 03:00:18.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-11-26 03:00:18.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 03:00:18.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-11-26 03:00:18.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 03:00:18.558  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-11-26 03:00:18.559  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-11-26 03:00:18.559 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-11-26 03:00:18.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-11-26 03:00:18.561  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-11-26 03:00:18.561  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-11-26 03:00:18.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 03:00:18.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 03:00:18.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 03:00:18.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 03:00:18.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 03:00:18.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 03:00:18.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-11-26 03:00:18.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-11-26 03:00:18.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-11-26 03:00:18.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-11-26 03:00:18.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250071544268420660353573439958167047160184149585 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 26 01:21:45 UTC 2021 Final Date: Wed Nov 26 01:21:44 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9c:29:4f:91:04:d2:05:9d:92:5e:7f:4e:5d:ba:d3:83:da:12:80:70] modulus: f095634faf0fcb503682436092d28c8f1d841497f547a1a9cf741dce47cdb599150c8e82d9b271c5020405371347f85c3a9cf5eb4c5a889d8d7173b159021c7229c3852f8a15ac9606cc052f76c14c298f5640bda41e2a61396a45797b9549991a2987530496a4bb4a27791afdc26ffd1408574dd4304483aea5fcfb2fb4fa8cd84c09922044d4bd4a4e1487862031d846dd51671df1f0db59f72d6d4064583d7295e60dfb74ff6bd75523ccf1d868ca07c5f014581ed1243e05dd1fd8396bd870e628cad2ecd20634eb8205c819305f4ef98fe0c676e0526ca912e7f3e3fb6aefb120ba909ba8e55b16ca627ddd8c85cb7f0cba44aa00daf661232607bd936c10484a5fa8c0cc485e22f3238a6083bfade2d1d9e3fa968b17dc0214eac206801ff19fd8a44fb632902673e6643d6b8ecac90560db3b68f22c5a7d9d436fb996793df12eb11f7387ccfc0b19299b9b893ee683d9afd1371ea9b65cb5b2833d642170ded8c5e13e047781b25c233457e1f4a77d72d9ce33c982049f2c02b724cf public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16529e897d3a7fa5b1ec57dd78dfdc4939d3bd94 b8b4ba4250a2860f84cb8eedfdc72eeef21b004f bc5a22853871b530d704428e7b89a47a7b58fba0 a6baca7e3c5b491d8be2b2bb9588fc2b0f39c581 ca672f2d635df9174d23927c426b86e87c385fd2 8b4289698ff17a25bff70df2a302c4c71dbaebd7 d65b87efa01ce53639c7cc1bda2f316246b60506 def3d7f8c42b00b8190541d2ecc02acc5832c270 17f5b910184fb9a825bf8844ed0e46daff461bbc 3e8f0ec8109ed562eab24d4b68b6a5951bc9bf92 bbbee11eea9d4a23c707a362e0615503d2988047 b1d7411565ed4bb15624ae51683f84f52df59841 c40d5785eecfc6b96bfc1ed53f7dd9e700ef7845 178688f8743101809cc4a25758547259cd743c78 244d00459705fe8eb6d861aa484dc722a720d1ce 39960376cc9ca500291adeec79ee4d5daef39644 1ee833b2b4784b17d413c5262472d825890d594e 4e5b2d6fc00aae9a041848b9e8fda4dc43dabc7b bf00ad220945e8eee94216cd88dd2f6b58a56d14 f1d8a74b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:2f:71:b8:d8:9c:e5:c2:3d:b3:a6:4d:87:eb:45:90:af:79:ef:81] modulus: bf3a8657b45e381017844429b832d6a195793b9bcb7d302500ad4bd4fa03d8414985add7a49b6e0a90b141faae34833394dc6226a3fff6be269cb836742825db0bdd09bef4ffe23f615a065fa1bca7329fb101dafb0d9c318ef27d024a3a64ba7577ecb3cce7476e2ded1eb95b40e8f0c68a543ddb8e87ef36058a39198dacff6452bdc531486743fcb756ac95ab335453f341b689855bef70dd7876ebd4931610d69120791c9037507a4a18ead895fa716c97652363b1ad8dca242a0ae005374a4814a11410cf9f5d2e972d027eaa691759bdd422063e38d2b0e5c60ed6e7e6f2dc0fc32a16885b7cf27c9b4a5473220b69978d6e2f31ebe985b764048995a7 public exponent: 10001 ]