2021-08-27 06:25:46,306 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-08-27 06:25:47,525 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-08-27 06:25:48.453  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-08-27 06:25:52.318 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-08-27 06:25:52.581  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-08-27 06:25:52.773  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-08-27 06:25:56.648  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 11.279 seconds (JVM running for 13.369) 2021-08-27 06:27:53.253  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-27 06:27:53.270 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-27 06:27:53.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-08-27 06:27:53.358 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-27 06:27:53.394  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-08-27 06:27:53.398  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-27 06:27:53.405  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-27 06:27:53.405  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 06:27:53.406  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-27 06:27:53.414  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-27 06:27:53.418  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-27 06:27:53.458  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-27 06:27:53.467  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 06:27:53.467  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 06:27:53.495  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-27 06:27:54.104  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-27 06:27:54.118  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-27 06:27:54.119 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-27 06:27:54.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-27 06:27:54.140  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1398 2021-08-27 06:27:54.140  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-27 06:27:54.145  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-27 06:27:54.146  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-27 06:27:54.154  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-27 06:27:54.156  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-27 06:27:54.157 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 06:27:54.157 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 06:27:54.158 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 06:27:54.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 06:27:54.174 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 06:27:54.175 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 06:27:54.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-27 06:27:54.225 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 354908748750511663552520806166430056545531477029 IssuerDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 27 06:21:48 UTC 2021 Final Date: Wed Aug 27 06:21:47 UTC 2031 SubjectDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:b9:3f:56:7d:8f:2d:cb:c3:11:c0:02:6a:f8:ae:df:93:87:ff:26] modulus: 9f75e77706cfd329a7ebea8bcf632ff513ae09b029d40ad84edba40029694e524521f3e74b8a2991ac28dd95c7d8556f49e7730d9a541f47c947b1785f11d5be02724c9485ebd383b5127df8fab95237ed5fa9a99b2a5836b1462be603b483cbe6f67d184248147748fcbe00df5a26a2ed9854b3a7b5d3898090187f06752272b0fb1ea3cbb7e1ea161d2e8208a34578489553a89b14447ff5df658ab4752e0dc3a101247e8b3358f76b9481693c7cd1e1d1548bd22347a75112b53205d9a7c57dfc0c054bade6aa8392d5047fad9be1d91ebe928b466e18ffce1682945e07245c6f793a5ca1371c229e581c959fa15e0051950c0f36fa43eb49345c39845c7099f2e21fab3026dea5c3c691539c79a17785aeb1a773129ca12b29e32ca4b928110726d76d6d82cf75ae5bf6254b83fe52a54e4acdfe26936ac0d92e7e81bd976392f5b59eb2873bd2197237c41b6530df2d43fdca86948b3e470f14703a32f772a76338e3219f7124173fd66b65cdb721ec0fba2b30c3216700ccbe11316427 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5505cbf4ad821b574953b2bc1a891ad35895f203 fd3db1011be1c24e3bc2aa25ca84e0ed9e697d91 7fcdd67bd72798d693595cb940aeae53b9435e12 c266ce9e75f551a09ccff83090647af323c89436 c267186861cac4078d8a49bf6aff9bc4889ba01a 619555c42a89d7d6c31d68af90ec7ba0550012f0 9cb71fcb078eb0e160215abe014131ac6d81e9b7 c067b98db76ca5dafb07834db85b677e6a8ff27d d723484ef0a77710dad56ff7bc3dd371c8fcb6f9 40eb808c907747a01138e2878305204fdebf4b6f f78fc895aeba1f5e27dcfbe7c5fe2da2394d2f63 18b625c4f5851a18fb7f7fefb963471e50aa4773 4a6d6d650a2591a021f5ed9f8f180bd1c6b75ef2 c7ccbb01c6dc6c85ad6652a9462d307ea715a1bb d521130cd4abb0437781929f91f7420b02ec3f03 7a997d595f32d77938327813db5c288c346f264a 54a106e68b976aa801bf55a2331548ef03d5cacc d1df4ecfdf4d74d477415a6d85f633c325de5650 89055fb95a406f07a58c0eb002483b85499b064c 6e768221 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:7d:c7:1c:39:8d:74:bd:d8:3c:77:68:c1:ef:78:48:58:93:9e:90] modulus: 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 public exponent: 10001 ] 2021-08-27 08:45:48.091  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-27 08:45:48.096 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-27 08:45:48.101 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-08-27 08:45:48.109 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-27 08:45:48.111  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-08-27 08:45:48.112  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-27 08:45:48.113  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-27 08:45:48.114  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-27 08:45:48.120  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-27 08:45:48.135  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-27 08:45:48.142  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:45:48.146  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:45:48.155  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-27 08:45:48.397  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-27 08:45:48.398  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-27 08:45:48.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-27 08:45:48.403 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-27 08:45:48.406  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1398 2021-08-27 08:45:48.406  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-27 08:45:48.410  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-27 08:45:48.412  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-27 08:45:48.413  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-27 08:45:48.414  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-27 08:45:48.415 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:45:48.416 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:45:48.416 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:45:48.418 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:45:48.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:45:48.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:45:48.421 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-27 08:45:48.427 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 354908748750511663552520806166430056545531477029 IssuerDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 27 06:21:48 UTC 2021 Final Date: Wed Aug 27 06:21:47 UTC 2031 SubjectDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:b9:3f:56:7d:8f:2d:cb:c3:11:c0:02:6a:f8:ae:df:93:87:ff:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5505cbf4ad821b574953b2bc1a891ad35895f203 fd3db1011be1c24e3bc2aa25ca84e0ed9e697d91 7fcdd67bd72798d693595cb940aeae53b9435e12 c266ce9e75f551a09ccff83090647af323c89436 c267186861cac4078d8a49bf6aff9bc4889ba01a 619555c42a89d7d6c31d68af90ec7ba0550012f0 9cb71fcb078eb0e160215abe014131ac6d81e9b7 c067b98db76ca5dafb07834db85b677e6a8ff27d d723484ef0a77710dad56ff7bc3dd371c8fcb6f9 40eb808c907747a01138e2878305204fdebf4b6f f78fc895aeba1f5e27dcfbe7c5fe2da2394d2f63 18b625c4f5851a18fb7f7fefb963471e50aa4773 4a6d6d650a2591a021f5ed9f8f180bd1c6b75ef2 c7ccbb01c6dc6c85ad6652a9462d307ea715a1bb d521130cd4abb0437781929f91f7420b02ec3f03 7a997d595f32d77938327813db5c288c346f264a 54a106e68b976aa801bf55a2331548ef03d5cacc d1df4ecfdf4d74d477415a6d85f633c325de5650 89055fb95a406f07a58c0eb002483b85499b064c 6e768221 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:59:7b:3f:4b:39:34:12:4a:e2:25:0d:01:82:fe:fc:ce:9f:86:c6] modulus: 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 public exponent: 10001 ] 2021-08-27 08:50:17.934  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-27 08:50:17.937 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-27 08:50:17.943 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-27 08:50:17.944 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-27 08:50:17.945  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-27 08:50:17.947  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-27 08:50:17.947  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-27 08:50:17.948  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-27 08:50:17.948  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-27 08:50:17.955  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-27 08:50:17.956  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:50:17.957  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:50:17.959  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-27 08:50:18.191  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-27 08:50:18.192  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-27 08:50:18.192 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-27 08:50:18.196 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-27 08:50:18.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1398 2021-08-27 08:50:18.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-27 08:50:18.200  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-27 08:50:18.201  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-27 08:50:18.202  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-27 08:50:18.204  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-27 08:50:18.206 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:50:18.207 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:50:18.207 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:50:18.209 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:50:18.209 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:50:18.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:50:18.211 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-27 08:50:18.218 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 354908748750511663552520806166430056545531477029 IssuerDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 27 06:21:48 UTC 2021 Final Date: Wed Aug 27 06:21:47 UTC 2031 SubjectDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:b9:3f:56:7d:8f:2d:cb:c3:11:c0:02:6a:f8:ae:df:93:87:ff:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5505cbf4ad821b574953b2bc1a891ad35895f203 fd3db1011be1c24e3bc2aa25ca84e0ed9e697d91 7fcdd67bd72798d693595cb940aeae53b9435e12 c266ce9e75f551a09ccff83090647af323c89436 c267186861cac4078d8a49bf6aff9bc4889ba01a 619555c42a89d7d6c31d68af90ec7ba0550012f0 9cb71fcb078eb0e160215abe014131ac6d81e9b7 c067b98db76ca5dafb07834db85b677e6a8ff27d d723484ef0a77710dad56ff7bc3dd371c8fcb6f9 40eb808c907747a01138e2878305204fdebf4b6f f78fc895aeba1f5e27dcfbe7c5fe2da2394d2f63 18b625c4f5851a18fb7f7fefb963471e50aa4773 4a6d6d650a2591a021f5ed9f8f180bd1c6b75ef2 c7ccbb01c6dc6c85ad6652a9462d307ea715a1bb d521130cd4abb0437781929f91f7420b02ec3f03 7a997d595f32d77938327813db5c288c346f264a 54a106e68b976aa801bf55a2331548ef03d5cacc d1df4ecfdf4d74d477415a6d85f633c325de5650 89055fb95a406f07a58c0eb002483b85499b064c 6e768221 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:b4:35:2b:f3:fb:73:85:59:71:28:f8:80:56:8d:53:82:df:20:7b] modulus: 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 public exponent: 10001 ] 2021-08-27 08:50:50.856  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-27 08:50:50.864 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-27 08:50:50.867 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-08-27 08:50:50.869 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-27 08:50:50.869  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-08-27 08:50:50.870  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-27 08:50:50.870  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-27 08:50:50.871  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-27 08:50:50.871  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-27 08:50:50.884  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-27 08:50:50.892  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:50:50.893  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:50:50.895  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-27 08:50:51.015  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-27 08:50:51.017  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-27 08:50:51.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-27 08:50:51.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-27 08:50:51.021  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1398 2021-08-27 08:50:51.021  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-27 08:50:51.023  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-27 08:50:51.024  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-27 08:50:51.027  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-27 08:50:51.027  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-27 08:50:51.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:50:51.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:50:51.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:50:51.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:50:51.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:50:51.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:50:51.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-27 08:50:51.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 354908748750511663552520806166430056545531477029 IssuerDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 27 06:21:48 UTC 2021 Final Date: Wed Aug 27 06:21:47 UTC 2031 SubjectDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:b9:3f:56:7d:8f:2d:cb:c3:11:c0:02:6a:f8:ae:df:93:87:ff:26] modulus: 9f75e77706cfd329a7ebea8bcf632ff513ae09b029d40ad84edba40029694e524521f3e74b8a2991ac28dd95c7d8556f49e7730d9a541f47c947b1785f11d5be02724c9485ebd383b5127df8fab95237ed5fa9a99b2a5836b1462be603b483cbe6f67d184248147748fcbe00df5a26a2ed9854b3a7b5d3898090187f06752272b0fb1ea3cbb7e1ea161d2e8208a34578489553a89b14447ff5df658ab4752e0dc3a101247e8b3358f76b9481693c7cd1e1d1548bd22347a75112b53205d9a7c57dfc0c054bade6aa8392d5047fad9be1d91ebe928b466e18ffce1682945e07245c6f793a5ca1371c229e581c959fa15e0051950c0f36fa43eb49345c39845c7099f2e21fab3026dea5c3c691539c79a17785aeb1a773129ca12b29e32ca4b928110726d76d6d82cf75ae5bf6254b83fe52a54e4acdfe26936ac0d92e7e81bd976392f5b59eb2873bd2197237c41b6530df2d43fdca86948b3e470f14703a32f772a76338e3219f7124173fd66b65cdb721ec0fba2b30c3216700ccbe11316427 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5505cbf4ad821b574953b2bc1a891ad35895f203 fd3db1011be1c24e3bc2aa25ca84e0ed9e697d91 7fcdd67bd72798d693595cb940aeae53b9435e12 c266ce9e75f551a09ccff83090647af323c89436 c267186861cac4078d8a49bf6aff9bc4889ba01a 619555c42a89d7d6c31d68af90ec7ba0550012f0 9cb71fcb078eb0e160215abe014131ac6d81e9b7 c067b98db76ca5dafb07834db85b677e6a8ff27d d723484ef0a77710dad56ff7bc3dd371c8fcb6f9 40eb808c907747a01138e2878305204fdebf4b6f f78fc895aeba1f5e27dcfbe7c5fe2da2394d2f63 18b625c4f5851a18fb7f7fefb963471e50aa4773 4a6d6d650a2591a021f5ed9f8f180bd1c6b75ef2 c7ccbb01c6dc6c85ad6652a9462d307ea715a1bb d521130cd4abb0437781929f91f7420b02ec3f03 7a997d595f32d77938327813db5c288c346f264a 54a106e68b976aa801bf55a2331548ef03d5cacc d1df4ecfdf4d74d477415a6d85f633c325de5650 89055fb95a406f07a58c0eb002483b85499b064c 6e768221 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:8f:12:aa:aa:46:f2:97:da:6d:7c:95:ab:4f:70:06:37:f8:7d:c2] modulus: efefc9500a685ff93946cdcbb3acc1bd7b5e90413ec19b99616c192f4b68c640704dda6086da2de9f241e555364482496cefac84230c8a968a80ca49f92711f29dc1b7e2264b1428f8bd2744fa49b53318ce48289e9560bfad8860181f293470c3a9abf551e1d9a38135300cadc8750547fd2dc9172a41152f9d0f3954ad9fa9812a4b1adcb071da21d024df09fc4a2472ec9f70e193b4498caf71b24d673a4d897cadf35949d23d56c5973d1d7cdbd99f6d4a72de00f9dce6d5eb4eb7b225f12a6cba3420baf2085c9a270d4fe370b79dfa3fabf3e512b0b893eb77f1725b64ec556a94a523d6e6167ccec262b30f55c33d94ed68e00f48109d0018d7080c91 public exponent: 10001 ] 2021-08-27 08:51:25.771  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-27 08:51:25.772 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-27 08:51:25.774 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-08-27 08:51:25.775 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-27 08:51:25.775  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-08-27 08:51:25.776  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-27 08:51:25.777  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-27 08:51:25.777  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-27 08:51:25.778  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-27 08:51:25.784  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-27 08:51:25.786  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:51:25.787  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:51:25.788  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-27 08:51:25.957  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-27 08:51:25.958  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-27 08:51:25.959 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-27 08:51:25.972 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-27 08:51:25.979  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1398 2021-08-27 08:51:25.980  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-27 08:51:25.983  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-27 08:51:25.984  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-27 08:51:26.000  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-27 08:51:26.002  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-27 08:51:26.003 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:51:26.003 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:51:26.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:51:26.005 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:51:26.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:51:26.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:51:26.008 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-27 08:51:26.014 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 354908748750511663552520806166430056545531477029 IssuerDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 27 06:21:48 UTC 2021 Final Date: Wed Aug 27 06:21:47 UTC 2031 SubjectDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:b9:3f:56:7d:8f:2d:cb:c3:11:c0:02:6a:f8:ae:df:93:87:ff:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5505cbf4ad821b574953b2bc1a891ad35895f203 fd3db1011be1c24e3bc2aa25ca84e0ed9e697d91 7fcdd67bd72798d693595cb940aeae53b9435e12 c266ce9e75f551a09ccff83090647af323c89436 c267186861cac4078d8a49bf6aff9bc4889ba01a 619555c42a89d7d6c31d68af90ec7ba0550012f0 9cb71fcb078eb0e160215abe014131ac6d81e9b7 c067b98db76ca5dafb07834db85b677e6a8ff27d d723484ef0a77710dad56ff7bc3dd371c8fcb6f9 40eb808c907747a01138e2878305204fdebf4b6f f78fc895aeba1f5e27dcfbe7c5fe2da2394d2f63 18b625c4f5851a18fb7f7fefb963471e50aa4773 4a6d6d650a2591a021f5ed9f8f180bd1c6b75ef2 c7ccbb01c6dc6c85ad6652a9462d307ea715a1bb d521130cd4abb0437781929f91f7420b02ec3f03 7a997d595f32d77938327813db5c288c346f264a 54a106e68b976aa801bf55a2331548ef03d5cacc d1df4ecfdf4d74d477415a6d85f633c325de5650 89055fb95a406f07a58c0eb002483b85499b064c 6e768221 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:e2:a5:59:a9:76:2a:41:6c:5b:05:eb:85:71:58:db:07:8a:eb:1f] modulus: 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 public exponent: 10001 ] 2021-08-27 08:53:51.229  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-27 08:53:51.231 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-27 08:53:51.235 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-27 08:53:51.237 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-27 08:53:51.238  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-27 08:53:51.239  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-27 08:53:51.239  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-27 08:53:51.240  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-27 08:53:51.240  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-27 08:53:51.249  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-27 08:53:51.251  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:53:51.251  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:53:51.252  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-27 08:53:51.387  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-27 08:53:51.389  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-27 08:53:51.390 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-27 08:53:51.391 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-27 08:53:51.393  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1398 2021-08-27 08:53:51.394  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-27 08:53:51.395  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-27 08:53:51.396  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-27 08:53:51.399  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-27 08:53:51.399  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-27 08:53:51.401 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:53:51.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:53:51.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:53:51.405 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:53:51.406 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:53:51.406 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:53:51.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-27 08:53:51.417 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 354908748750511663552520806166430056545531477029 IssuerDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 27 06:21:48 UTC 2021 Final Date: Wed Aug 27 06:21:47 UTC 2031 SubjectDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:b9:3f:56:7d:8f:2d:cb:c3:11:c0:02:6a:f8:ae:df:93:87:ff:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5505cbf4ad821b574953b2bc1a891ad35895f203 fd3db1011be1c24e3bc2aa25ca84e0ed9e697d91 7fcdd67bd72798d693595cb940aeae53b9435e12 c266ce9e75f551a09ccff83090647af323c89436 c267186861cac4078d8a49bf6aff9bc4889ba01a 619555c42a89d7d6c31d68af90ec7ba0550012f0 9cb71fcb078eb0e160215abe014131ac6d81e9b7 c067b98db76ca5dafb07834db85b677e6a8ff27d d723484ef0a77710dad56ff7bc3dd371c8fcb6f9 40eb808c907747a01138e2878305204fdebf4b6f f78fc895aeba1f5e27dcfbe7c5fe2da2394d2f63 18b625c4f5851a18fb7f7fefb963471e50aa4773 4a6d6d650a2591a021f5ed9f8f180bd1c6b75ef2 c7ccbb01c6dc6c85ad6652a9462d307ea715a1bb d521130cd4abb0437781929f91f7420b02ec3f03 7a997d595f32d77938327813db5c288c346f264a 54a106e68b976aa801bf55a2331548ef03d5cacc d1df4ecfdf4d74d477415a6d85f633c325de5650 89055fb95a406f07a58c0eb002483b85499b064c 6e768221 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:8e:84:06:bc:c1:ae:72:1b:36:84:2e:53:54:be:2d:82:2c:f2:3d] modulus: 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 public exponent: 10001 ] 2021-08-27 08:54:01.775  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-27 08:54:01.776 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-27 08:54:01.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-27 08:54:01.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-27 08:54:01.783  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-27 08:54:01.784  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-27 08:54:01.785  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-27 08:54:01.785  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-27 08:54:01.786  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-27 08:54:01.791  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-27 08:54:01.791  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:54:01.792  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:54:01.794  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-27 08:54:01.884  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-27 08:54:01.889  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-27 08:54:01.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-27 08:54:01.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-27 08:54:01.894  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1398 2021-08-27 08:54:01.895  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-27 08:54:01.897  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-27 08:54:01.900  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-27 08:54:01.905  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-27 08:54:01.905  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-27 08:54:01.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:54:01.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:54:01.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:54:01.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:54:01.908 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:54:01.908 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:54:01.909 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-27 08:54:01.913 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 354908748750511663552520806166430056545531477029 IssuerDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 27 06:21:48 UTC 2021 Final Date: Wed Aug 27 06:21:47 UTC 2031 SubjectDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:b9:3f:56:7d:8f:2d:cb:c3:11:c0:02:6a:f8:ae:df:93:87:ff:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5505cbf4ad821b574953b2bc1a891ad35895f203 fd3db1011be1c24e3bc2aa25ca84e0ed9e697d91 7fcdd67bd72798d693595cb940aeae53b9435e12 c266ce9e75f551a09ccff83090647af323c89436 c267186861cac4078d8a49bf6aff9bc4889ba01a 619555c42a89d7d6c31d68af90ec7ba0550012f0 9cb71fcb078eb0e160215abe014131ac6d81e9b7 c067b98db76ca5dafb07834db85b677e6a8ff27d d723484ef0a77710dad56ff7bc3dd371c8fcb6f9 40eb808c907747a01138e2878305204fdebf4b6f f78fc895aeba1f5e27dcfbe7c5fe2da2394d2f63 18b625c4f5851a18fb7f7fefb963471e50aa4773 4a6d6d650a2591a021f5ed9f8f180bd1c6b75ef2 c7ccbb01c6dc6c85ad6652a9462d307ea715a1bb d521130cd4abb0437781929f91f7420b02ec3f03 7a997d595f32d77938327813db5c288c346f264a 54a106e68b976aa801bf55a2331548ef03d5cacc d1df4ecfdf4d74d477415a6d85f633c325de5650 89055fb95a406f07a58c0eb002483b85499b064c 6e768221 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:18:9e:be:73:f5:64:94:c1:57:9e:a3:9a:ae:d6:bc:18:9b:13:7c] modulus: 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 public exponent: 10001 ] 2021-08-27 08:55:35.159  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-27 08:55:35.163 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-27 08:55:35.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-27 08:55:35.170 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-27 08:55:35.170  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-27 08:55:35.172  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-27 08:55:35.172  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-27 08:55:35.173  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-27 08:55:35.174  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-27 08:55:35.182  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-27 08:55:35.184  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:55:35.185  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:55:35.186  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-27 08:55:35.324  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-27 08:55:35.325  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-27 08:55:35.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-27 08:55:35.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-27 08:55:35.328  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1398 2021-08-27 08:55:35.329  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-27 08:55:35.331  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-27 08:55:35.332  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-27 08:55:35.332  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-27 08:55:35.333  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-27 08:55:35.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:55:35.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:55:35.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:55:35.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:55:35.335 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:55:35.336 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:55:35.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-27 08:55:35.342 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 354908748750511663552520806166430056545531477029 IssuerDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 27 06:21:48 UTC 2021 Final Date: Wed Aug 27 06:21:47 UTC 2031 SubjectDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:b9:3f:56:7d:8f:2d:cb:c3:11:c0:02:6a:f8:ae:df:93:87:ff:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5505cbf4ad821b574953b2bc1a891ad35895f203 fd3db1011be1c24e3bc2aa25ca84e0ed9e697d91 7fcdd67bd72798d693595cb940aeae53b9435e12 c266ce9e75f551a09ccff83090647af323c89436 c267186861cac4078d8a49bf6aff9bc4889ba01a 619555c42a89d7d6c31d68af90ec7ba0550012f0 9cb71fcb078eb0e160215abe014131ac6d81e9b7 c067b98db76ca5dafb07834db85b677e6a8ff27d d723484ef0a77710dad56ff7bc3dd371c8fcb6f9 40eb808c907747a01138e2878305204fdebf4b6f f78fc895aeba1f5e27dcfbe7c5fe2da2394d2f63 18b625c4f5851a18fb7f7fefb963471e50aa4773 4a6d6d650a2591a021f5ed9f8f180bd1c6b75ef2 c7ccbb01c6dc6c85ad6652a9462d307ea715a1bb d521130cd4abb0437781929f91f7420b02ec3f03 7a997d595f32d77938327813db5c288c346f264a 54a106e68b976aa801bf55a2331548ef03d5cacc d1df4ecfdf4d74d477415a6d85f633c325de5650 89055fb95a406f07a58c0eb002483b85499b064c 6e768221 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:28:68:a2:17:4c:6f:b4:50:c9:0c:b7:90:47:9e:4d:aa:d1:f7:3e] modulus: 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 public exponent: 10001 ] 2021-08-27 08:57:06.413  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-27 08:57:06.416 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-27 08:57:06.420 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-08-27 08:57:06.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-27 08:57:06.422  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-08-27 08:57:06.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-27 08:57:06.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-27 08:57:06.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-27 08:57:06.424  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-27 08:57:06.429  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-27 08:57:06.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:57:06.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-27 08:57:06.432  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-27 08:57:06.593  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-27 08:57:06.595  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-27 08:57:06.596 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-27 08:57:06.597 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-27 08:57:06.598  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1398 2021-08-27 08:57:06.599  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-27 08:57:06.600  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-27 08:57:06.601  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-27 08:57:06.602  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-27 08:57:06.602  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-27 08:57:06.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:57:06.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:57:06.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:57:06.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-27 08:57:06.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-27 08:57:06.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-27 08:57:06.607 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-27 08:57:06.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 354908748750511663552520806166430056545531477029 IssuerDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 27 06:21:48 UTC 2021 Final Date: Wed Aug 27 06:21:47 UTC 2031 SubjectDN: UID=c-0h0emzggkpbgysbtc,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f6:b9:3f:56:7d:8f:2d:cb:c3:11:c0:02:6a:f8:ae:df:93:87:ff:26] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5505cbf4ad821b574953b2bc1a891ad35895f203 fd3db1011be1c24e3bc2aa25ca84e0ed9e697d91 7fcdd67bd72798d693595cb940aeae53b9435e12 c266ce9e75f551a09ccff83090647af323c89436 c267186861cac4078d8a49bf6aff9bc4889ba01a 619555c42a89d7d6c31d68af90ec7ba0550012f0 9cb71fcb078eb0e160215abe014131ac6d81e9b7 c067b98db76ca5dafb07834db85b677e6a8ff27d d723484ef0a77710dad56ff7bc3dd371c8fcb6f9 40eb808c907747a01138e2878305204fdebf4b6f f78fc895aeba1f5e27dcfbe7c5fe2da2394d2f63 18b625c4f5851a18fb7f7fefb963471e50aa4773 4a6d6d650a2591a021f5ed9f8f180bd1c6b75ef2 c7ccbb01c6dc6c85ad6652a9462d307ea715a1bb d521130cd4abb0437781929f91f7420b02ec3f03 7a997d595f32d77938327813db5c288c346f264a 54a106e68b976aa801bf55a2331548ef03d5cacc d1df4ecfdf4d74d477415a6d85f633c325de5650 89055fb95a406f07a58c0eb002483b85499b064c 6e768221 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:0a:3c:3c:7a:7f:70:80:52:cb:c3:92:8e:9c:d8:06:5b:73:72:17] modulus: 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 public exponent: 10001 ]