2021-12-02 01:26:22,180 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-12-02 01:26:26,377 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-12-02 01:26:29.383  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-12-02 01:26:43.784 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-12-02 01:26:44.971  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-12-02 01:26:45.587  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-12-02 01:26:58.683  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 39.101 seconds (JVM running for 46.475) 2021-12-02 01:28:15.171  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 01:28:15.180 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 01:28:15.372 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-12-02 01:28:15.377 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 01:28:15.391  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-12-02 01:28:15.474  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 01:28:15.476  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 01:28:15.478 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 01:28:15.479 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 01:28:15.482 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 01:28:15.571 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 01:28:15.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 01:28:15.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 01:28:15.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 01:28:15.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 01:28:15.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 01:28:17.256  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 01:28:17.259  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 01:28:17.259 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 01:28:17.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 01:28:17.270  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 01:28:17.271  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 01:28:17.272 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 01:28:17.273 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 01:28:17.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 01:28:17.287 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 01:28:17.288 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 01:28:17.288 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 01:28:17.293 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 01:28:17.294 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 01:28:17.294 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 01:28:17.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 01:28:17.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562940141200586049523125590672139332217787589180 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 01:22:11 UTC 2021 Final Date: Tue Dec 02 01:22:10 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:52:e0:7d:26:57:06:d6:88:21:bc:92:23:3c:5b:1b:d9:a9:53:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18dc9eedf7c65090a4dd0e76dd6ecf6158f1183a 04ce3d4d0eb3df669d905bf0ee3a3a4ce51ff702 5c7d0199f65b52dc08883b592bdfa0a62b3b3848 f2b673ed0fa58f432df95ec14fcd4486d517740b 2ecf634063d981d4fba403675bcf89cf2f86b744 309ccca753e73ea83f5a774d46a2aaf904c89adb 25087b5fddd3f56814d7324fe6b1f1d244f4395b 3c59803790328370788834401391d4681f1b8f66 2aa50a4e8fb0440f2642efa7fd93ae226069dd95 8073a185904345dd4e2315030d363efba8bf93fa 28e000b1386139ab8aa884a60e3e61de7fb1c147 74f97336284780973c5f66f315dcca29a5cd1216 109e5a25c09aee33c4fa95c13d0f4f494eece8f4 5b76848b45dc2f8a5b350f76d18d889bf3b7c4c7 c40c028b3ea30b942e6820ad80c82d5fd89b6274 6b5db321174231a46ee9aeb331dbcc9c67939fec 1996c66cb7cc71b32023b85e9720f0271dd0acab 889e1d4a76857df3f8ec70a4a4f835afde8aa947 9d486f85e95200851fb494cdf848bbe6bad32ce9 00b56362 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:61:c8:30:fd:21:68:94:72:a5:2f:b6:4e:d2:ee:16:15:19:f5:7f] modulus: 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 public exponent: 10001 ] 2021-12-02 02:54:15.783  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 02:54:15.786 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 02:54:15.789 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-12-02 02:54:15.791 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 02:54:15.871  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-12-02 02:54:15.873  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 02:54:15.874  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 02:54:15.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 02:54:15.876 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 02:54:15.877 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 02:54:15.892 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 02:54:15.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:54:15.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:54:15.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:54:16.174  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 02:54:16.175  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 02:54:16.176 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 02:54:16.176 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:54:16.180  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 02:54:16.181  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 02:54:16.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:54:16.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:54:16.183 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:54:16.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:54:16.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:54:16.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:54:16.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:54:16.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:54:16.187 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:54:16.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 02:54:16.275 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562940141200586049523125590672139332217787589180 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 01:22:11 UTC 2021 Final Date: Tue Dec 02 01:22:10 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:52:e0:7d:26:57:06:d6:88:21:bc:92:23:3c:5b:1b:d9:a9:53:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18dc9eedf7c65090a4dd0e76dd6ecf6158f1183a 04ce3d4d0eb3df669d905bf0ee3a3a4ce51ff702 5c7d0199f65b52dc08883b592bdfa0a62b3b3848 f2b673ed0fa58f432df95ec14fcd4486d517740b 2ecf634063d981d4fba403675bcf89cf2f86b744 309ccca753e73ea83f5a774d46a2aaf904c89adb 25087b5fddd3f56814d7324fe6b1f1d244f4395b 3c59803790328370788834401391d4681f1b8f66 2aa50a4e8fb0440f2642efa7fd93ae226069dd95 8073a185904345dd4e2315030d363efba8bf93fa 28e000b1386139ab8aa884a60e3e61de7fb1c147 74f97336284780973c5f66f315dcca29a5cd1216 109e5a25c09aee33c4fa95c13d0f4f494eece8f4 5b76848b45dc2f8a5b350f76d18d889bf3b7c4c7 c40c028b3ea30b942e6820ad80c82d5fd89b6274 6b5db321174231a46ee9aeb331dbcc9c67939fec 1996c66cb7cc71b32023b85e9720f0271dd0acab 889e1d4a76857df3f8ec70a4a4f835afde8aa947 9d486f85e95200851fb494cdf848bbe6bad32ce9 00b56362 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [27:fc:c8:52:39:d1:f7:e1:92:63:63:e6:2b:4f:70:bd:d4:78:e2:bc] modulus: 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 public exponent: 10001 ] 2021-12-02 02:56:05.262  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 02:56:05.264 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 02:56:05.266 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-12-02 02:56:05.266 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 02:56:05.267  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-12-02 02:56:05.271  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 02:56:05.271  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 02:56:05.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 02:56:05.272 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 02:56:05.272 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 02:56:05.278 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 02:56:05.278 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:56:05.279 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:56:05.279 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:56:05.375  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 02:56:05.376  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 02:56:05.377 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 02:56:05.377 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:56:05.380  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 02:56:05.380  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 02:56:05.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:56:05.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:56:05.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:56:05.383 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:56:05.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:56:05.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:56:05.385 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:56:05.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:56:05.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:56:05.387 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 02:56:05.390 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562940141200586049523125590672139332217787589180 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 01:22:11 UTC 2021 Final Date: Tue Dec 02 01:22:10 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:52:e0:7d:26:57:06:d6:88:21:bc:92:23:3c:5b:1b:d9:a9:53:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18dc9eedf7c65090a4dd0e76dd6ecf6158f1183a 04ce3d4d0eb3df669d905bf0ee3a3a4ce51ff702 5c7d0199f65b52dc08883b592bdfa0a62b3b3848 f2b673ed0fa58f432df95ec14fcd4486d517740b 2ecf634063d981d4fba403675bcf89cf2f86b744 309ccca753e73ea83f5a774d46a2aaf904c89adb 25087b5fddd3f56814d7324fe6b1f1d244f4395b 3c59803790328370788834401391d4681f1b8f66 2aa50a4e8fb0440f2642efa7fd93ae226069dd95 8073a185904345dd4e2315030d363efba8bf93fa 28e000b1386139ab8aa884a60e3e61de7fb1c147 74f97336284780973c5f66f315dcca29a5cd1216 109e5a25c09aee33c4fa95c13d0f4f494eece8f4 5b76848b45dc2f8a5b350f76d18d889bf3b7c4c7 c40c028b3ea30b942e6820ad80c82d5fd89b6274 6b5db321174231a46ee9aeb331dbcc9c67939fec 1996c66cb7cc71b32023b85e9720f0271dd0acab 889e1d4a76857df3f8ec70a4a4f835afde8aa947 9d486f85e95200851fb494cdf848bbe6bad32ce9 00b56362 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7f:b7:5f:c0:d6:a0:24:7f:75:cd:fd:59:38:5d:a6:c9:b8:0b:21:40] modulus: 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 public exponent: 10001 ] 2021-12-02 02:58:58.375  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 02:58:58.377 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 02:58:58.378 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-12-02 02:58:58.379 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 02:58:58.379  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-12-02 02:58:58.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 02:58:58.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 02:58:58.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 02:58:58.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 02:58:58.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 02:58:58.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 02:58:58.390 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:58:58.390 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:58:58.390 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:58:58.572  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 02:58:58.573  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 02:58:58.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 02:58:58.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:58:58.574  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 02:58:58.575  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 02:58:58.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:58:58.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:58:58.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:58:58.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:58:58.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:58:58.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:58:58.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:58:58.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:58:58.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:58:58.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 02:58:58.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562940141200586049523125590672139332217787589180 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 01:22:11 UTC 2021 Final Date: Tue Dec 02 01:22:10 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:52:e0:7d:26:57:06:d6:88:21:bc:92:23:3c:5b:1b:d9:a9:53:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18dc9eedf7c65090a4dd0e76dd6ecf6158f1183a 04ce3d4d0eb3df669d905bf0ee3a3a4ce51ff702 5c7d0199f65b52dc08883b592bdfa0a62b3b3848 f2b673ed0fa58f432df95ec14fcd4486d517740b 2ecf634063d981d4fba403675bcf89cf2f86b744 309ccca753e73ea83f5a774d46a2aaf904c89adb 25087b5fddd3f56814d7324fe6b1f1d244f4395b 3c59803790328370788834401391d4681f1b8f66 2aa50a4e8fb0440f2642efa7fd93ae226069dd95 8073a185904345dd4e2315030d363efba8bf93fa 28e000b1386139ab8aa884a60e3e61de7fb1c147 74f97336284780973c5f66f315dcca29a5cd1216 109e5a25c09aee33c4fa95c13d0f4f494eece8f4 5b76848b45dc2f8a5b350f76d18d889bf3b7c4c7 c40c028b3ea30b942e6820ad80c82d5fd89b6274 6b5db321174231a46ee9aeb331dbcc9c67939fec 1996c66cb7cc71b32023b85e9720f0271dd0acab 889e1d4a76857df3f8ec70a4a4f835afde8aa947 9d486f85e95200851fb494cdf848bbe6bad32ce9 00b56362 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:ed:a8:6d:3b:5d:ed:e8:f5:9e:30:5d:64:d1:a1:ba:5a:ce:8c:41] modulus: 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 public exponent: 10001 ] 2021-12-02 02:59:00.126  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 02:59:00.127 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 02:59:00.129 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-12-02 02:59:00.129 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 02:59:00.130  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-12-02 02:59:00.130  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 02:59:00.131  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 02:59:00.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 02:59:00.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 02:59:00.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 02:59:00.169 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 02:59:00.170 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:59:00.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:59:00.172 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:59:00.251  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 02:59:00.268  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 02:59:00.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 02:59:00.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:59:00.272  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 02:59:00.272  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 02:59:00.273 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:59:00.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:59:00.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:59:00.275 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:59:00.276 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:59:00.276 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:59:00.277 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:59:00.277 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:59:00.278 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:59:00.278 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 02:59:00.282 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562940141200586049523125590672139332217787589180 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 01:22:11 UTC 2021 Final Date: Tue Dec 02 01:22:10 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:52:e0:7d:26:57:06:d6:88:21:bc:92:23:3c:5b:1b:d9:a9:53:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18dc9eedf7c65090a4dd0e76dd6ecf6158f1183a 04ce3d4d0eb3df669d905bf0ee3a3a4ce51ff702 5c7d0199f65b52dc08883b592bdfa0a62b3b3848 f2b673ed0fa58f432df95ec14fcd4486d517740b 2ecf634063d981d4fba403675bcf89cf2f86b744 309ccca753e73ea83f5a774d46a2aaf904c89adb 25087b5fddd3f56814d7324fe6b1f1d244f4395b 3c59803790328370788834401391d4681f1b8f66 2aa50a4e8fb0440f2642efa7fd93ae226069dd95 8073a185904345dd4e2315030d363efba8bf93fa 28e000b1386139ab8aa884a60e3e61de7fb1c147 74f97336284780973c5f66f315dcca29a5cd1216 109e5a25c09aee33c4fa95c13d0f4f494eece8f4 5b76848b45dc2f8a5b350f76d18d889bf3b7c4c7 c40c028b3ea30b942e6820ad80c82d5fd89b6274 6b5db321174231a46ee9aeb331dbcc9c67939fec 1996c66cb7cc71b32023b85e9720f0271dd0acab 889e1d4a76857df3f8ec70a4a4f835afde8aa947 9d486f85e95200851fb494cdf848bbe6bad32ce9 00b56362 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:1a:c3:d8:c0:56:a3:80:95:2a:ff:60:b0:ba:d7:31:7d:f0:cb:ed] modulus: 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 public exponent: 10001 ] 2021-12-02 02:59:29.275  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 02:59:29.276 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 02:59:29.277 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-12-02 02:59:29.278 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 02:59:29.278  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-12-02 02:59:29.279  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 02:59:29.279  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 02:59:29.279 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 02:59:29.280 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 02:59:29.280 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 02:59:29.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 02:59:29.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:59:29.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 02:59:29.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:59:29.451  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 02:59:29.468  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 02:59:29.468 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 02:59:29.469 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 02:59:29.470  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 02:59:29.470  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 02:59:29.470 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:59:29.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:59:29.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:59:29.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:59:29.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:59:29.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:59:29.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 02:59:29.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 02:59:29.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 02:59:29.474 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 02:59:29.476 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562940141200586049523125590672139332217787589180 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 01:22:11 UTC 2021 Final Date: Tue Dec 02 01:22:10 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:52:e0:7d:26:57:06:d6:88:21:bc:92:23:3c:5b:1b:d9:a9:53:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18dc9eedf7c65090a4dd0e76dd6ecf6158f1183a 04ce3d4d0eb3df669d905bf0ee3a3a4ce51ff702 5c7d0199f65b52dc08883b592bdfa0a62b3b3848 f2b673ed0fa58f432df95ec14fcd4486d517740b 2ecf634063d981d4fba403675bcf89cf2f86b744 309ccca753e73ea83f5a774d46a2aaf904c89adb 25087b5fddd3f56814d7324fe6b1f1d244f4395b 3c59803790328370788834401391d4681f1b8f66 2aa50a4e8fb0440f2642efa7fd93ae226069dd95 8073a185904345dd4e2315030d363efba8bf93fa 28e000b1386139ab8aa884a60e3e61de7fb1c147 74f97336284780973c5f66f315dcca29a5cd1216 109e5a25c09aee33c4fa95c13d0f4f494eece8f4 5b76848b45dc2f8a5b350f76d18d889bf3b7c4c7 c40c028b3ea30b942e6820ad80c82d5fd89b6274 6b5db321174231a46ee9aeb331dbcc9c67939fec 1996c66cb7cc71b32023b85e9720f0271dd0acab 889e1d4a76857df3f8ec70a4a4f835afde8aa947 9d486f85e95200851fb494cdf848bbe6bad32ce9 00b56362 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:b6:f8:e7:0b:5b:02:ae:c1:a7:71:4f:72:6f:2e:20:07:90:f2:e6] modulus: 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 public exponent: 10001 ] 2021-12-02 03:00:01.928  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 03:00:01.929 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 03:00:01.930 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-12-02 03:00:01.931 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 03:00:01.931  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-12-02 03:00:01.932  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 03:00:01.932  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 03:00:01.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 03:00:01.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 03:00:01.933 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 03:00:01.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 03:00:01.938 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 03:00:01.938 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 03:00:01.938 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 03:00:02.047  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 03:00:02.048  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 03:00:02.048 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 03:00:02.049 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 03:00:02.050  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 03:00:02.051  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 03:00:02.068 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 03:00:02.069 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 03:00:02.070 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 03:00:02.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 03:00:02.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 03:00:02.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 03:00:02.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 03:00:02.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 03:00:02.073 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 03:00:02.074 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 03:00:02.079 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562940141200586049523125590672139332217787589180 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 01:22:11 UTC 2021 Final Date: Tue Dec 02 01:22:10 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:52:e0:7d:26:57:06:d6:88:21:bc:92:23:3c:5b:1b:d9:a9:53:b2] modulus: c78327f9d48b9c4fa30036454b539017fc9c0c1b16f9a3c488c431496c5c08d5898b444af0305192c97ca07fabcd462c29c2cd990f86da95bee12b868324ca25619839d8ea84ce4f7844e02d84904ea6606421bf0e2c6e42b855f1e66fb3703a0a831114463ce568711b6da3c5672ac7734c4c7d24828e6e063d0dde116137f2347580324a856de23eb90fad39d6d00cf2bf132a5caf59ec3b8302179c01159f120d7f9ad05f7b1c040bfc844460c0c8596bde8e76c8768225c1b458b429d6353252eb5ec648bfc1dea761d400f564ea3579f6603223ed5356263cea7fe578eaac479505cad9aa27252f4d54e531fa988a43cad9a6895e5f3e585a7a44cb227be2681373b6d795aaf3a9a7cbc98425320ec897d57014e4bffa1ee358b8103a75bda076d5c13f3dae11befaec47d4d31cc4d195bde646a8937550f45bed90f47ae8edb2c539fca600abffe555c3cdccaf6fb14bc2dafbba8e0dc1b30e46e2b99114954162cd0e537fa1969af3fbefa0d9e0f3e84b0fb06dc5e5836f9feea67cc3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18dc9eedf7c65090a4dd0e76dd6ecf6158f1183a 04ce3d4d0eb3df669d905bf0ee3a3a4ce51ff702 5c7d0199f65b52dc08883b592bdfa0a62b3b3848 f2b673ed0fa58f432df95ec14fcd4486d517740b 2ecf634063d981d4fba403675bcf89cf2f86b744 309ccca753e73ea83f5a774d46a2aaf904c89adb 25087b5fddd3f56814d7324fe6b1f1d244f4395b 3c59803790328370788834401391d4681f1b8f66 2aa50a4e8fb0440f2642efa7fd93ae226069dd95 8073a185904345dd4e2315030d363efba8bf93fa 28e000b1386139ab8aa884a60e3e61de7fb1c147 74f97336284780973c5f66f315dcca29a5cd1216 109e5a25c09aee33c4fa95c13d0f4f494eece8f4 5b76848b45dc2f8a5b350f76d18d889bf3b7c4c7 c40c028b3ea30b942e6820ad80c82d5fd89b6274 6b5db321174231a46ee9aeb331dbcc9c67939fec 1996c66cb7cc71b32023b85e9720f0271dd0acab 889e1d4a76857df3f8ec70a4a4f835afde8aa947 9d486f85e95200851fb494cdf848bbe6bad32ce9 00b56362 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:ba:20:b1:ee:32:15:6d:4b:05:9c:f2:05:ee:b8:a7:9d:6e:02:90] modulus: b91c610035860f98366a69f3b8d44c9346c5b3de3bcfd86cdd898ae35961e20eb7de745645b0efe215d8d8d19e535e214fbcb7a3c9dca310d839d105bfeaed14f6080d10ec65996ed956601bf9346d7a0d99ccecdf12813624f38af50231942b8d5b19dda86133de1d6cd650f277284635634d89063c7c23a3e69ad32b3fca7bc66a5062c5f38082afc13ade5cb18f089dcb38e5ea9e69989c3bfd6515ed7f7d87cdefc1ddae33bfc9d14426f40aa4ec3e686653beede273e18f332e9efa7c586940a5ecbc50b14d336bcca686d047a53105a877c08b549f581a96f99fe7b52238432b9b654b1cedb92880d46d24cc158006a57821a5abb50fa54736fc497fe7 public exponent: 10001 ] 2021-12-02 03:01:11.290  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 03:01:11.291 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 03:01:11.292 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-12-02 03:01:11.293 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 03:01:11.293  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-12-02 03:01:11.293  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 03:01:11.294  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 03:01:11.294 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 03:01:11.294 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 03:01:11.294 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 03:01:11.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 03:01:11.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 03:01:11.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 03:01:11.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 03:01:11.464  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 03:01:11.464  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 03:01:11.465 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 03:01:11.465 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 03:01:11.467  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 03:01:11.468  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 03:01:11.468 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 03:01:11.469 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 03:01:11.469 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 03:01:11.469 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 03:01:11.470 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 03:01:11.470 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 03:01:11.471 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 03:01:11.472 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 03:01:11.472 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 03:01:11.474 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 03:01:11.478 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562940141200586049523125590672139332217787589180 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 01:22:11 UTC 2021 Final Date: Tue Dec 02 01:22:10 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:52:e0:7d:26:57:06:d6:88:21:bc:92:23:3c:5b:1b:d9:a9:53:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18dc9eedf7c65090a4dd0e76dd6ecf6158f1183a 04ce3d4d0eb3df669d905bf0ee3a3a4ce51ff702 5c7d0199f65b52dc08883b592bdfa0a62b3b3848 f2b673ed0fa58f432df95ec14fcd4486d517740b 2ecf634063d981d4fba403675bcf89cf2f86b744 309ccca753e73ea83f5a774d46a2aaf904c89adb 25087b5fddd3f56814d7324fe6b1f1d244f4395b 3c59803790328370788834401391d4681f1b8f66 2aa50a4e8fb0440f2642efa7fd93ae226069dd95 8073a185904345dd4e2315030d363efba8bf93fa 28e000b1386139ab8aa884a60e3e61de7fb1c147 74f97336284780973c5f66f315dcca29a5cd1216 109e5a25c09aee33c4fa95c13d0f4f494eece8f4 5b76848b45dc2f8a5b350f76d18d889bf3b7c4c7 c40c028b3ea30b942e6820ad80c82d5fd89b6274 6b5db321174231a46ee9aeb331dbcc9c67939fec 1996c66cb7cc71b32023b85e9720f0271dd0acab 889e1d4a76857df3f8ec70a4a4f835afde8aa947 9d486f85e95200851fb494cdf848bbe6bad32ce9 00b56362 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b2:03:4d:e9:b9:86:5e:5e:23:9f:68:22:ef:cd:6f:53:b0:dd:4e:85] modulus: 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 public exponent: 10001 ] 2021-12-02 03:02:40.839  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-12-02 03:02:40.840 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-12-02 03:02:40.841 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-12-02 03:02:40.842 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-12-02 03:02:40.842  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-12-02 03:02:40.843  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-12-02 03:02:40.843  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-12-02 03:02:40.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-12-02 03:02:40.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-12-02 03:02:40.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-12-02 03:02:40.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-12-02 03:02:40.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 03:02:40.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-12-02 03:02:40.849 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 03:02:40.951  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-12-02 03:02:40.968  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-12-02 03:02:40.969 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-12-02 03:02:40.969 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-12-02 03:02:40.971  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-12-02 03:02:40.971  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-12-02 03:02:40.972 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 03:02:40.972 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 03:02:40.973 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 03:02:40.974 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 03:02:40.974 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 03:02:40.974 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 03:02:40.975 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-12-02 03:02:40.975 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-12-02 03:02:40.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-12-02 03:02:40.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-12-02 03:02:40.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562940141200586049523125590672139332217787589180 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Dec 02 01:22:11 UTC 2021 Final Date: Tue Dec 02 01:22:10 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [48:52:e0:7d:26:57:06:d6:88:21:bc:92:23:3c:5b:1b:d9:a9:53:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 18dc9eedf7c65090a4dd0e76dd6ecf6158f1183a 04ce3d4d0eb3df669d905bf0ee3a3a4ce51ff702 5c7d0199f65b52dc08883b592bdfa0a62b3b3848 f2b673ed0fa58f432df95ec14fcd4486d517740b 2ecf634063d981d4fba403675bcf89cf2f86b744 309ccca753e73ea83f5a774d46a2aaf904c89adb 25087b5fddd3f56814d7324fe6b1f1d244f4395b 3c59803790328370788834401391d4681f1b8f66 2aa50a4e8fb0440f2642efa7fd93ae226069dd95 8073a185904345dd4e2315030d363efba8bf93fa 28e000b1386139ab8aa884a60e3e61de7fb1c147 74f97336284780973c5f66f315dcca29a5cd1216 109e5a25c09aee33c4fa95c13d0f4f494eece8f4 5b76848b45dc2f8a5b350f76d18d889bf3b7c4c7 c40c028b3ea30b942e6820ad80c82d5fd89b6274 6b5db321174231a46ee9aeb331dbcc9c67939fec 1996c66cb7cc71b32023b85e9720f0271dd0acab 889e1d4a76857df3f8ec70a4a4f835afde8aa947 9d486f85e95200851fb494cdf848bbe6bad32ce9 00b56362 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:20:55:f7:aa:1e:a9:3b:f0:e4:7b:ca:63:fb:93:3d:41:0b:7a:cb] modulus: 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 public exponent: 10001 ]