2021-09-03 12:39:12,955 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-03 12:39:13,720 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-03 12:39:14.510  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-09-03 12:39:17.358 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-03 12:39:17.635  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-09-03 12:39:17.806  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-03 12:39:20.368  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.137 seconds (JVM running for 9.998) 2021-09-03 12:40:09.941  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 12:40:09.951 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 12:40:09.991 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-03 12:40:09.996 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 12:40:10.012  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-03 12:40:10.016  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 12:40:10.022  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 12:40:10.022  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 12:40:10.023  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 12:40:10.031  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 12:40:10.035  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 12:40:10.076  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 12:40:10.081  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 12:40:10.082  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 12:40:10.097  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 12:40:10.606  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 12:40:10.610  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 12:40:10.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 12:40:10.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 12:40:10.620  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 12:40:10.620  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 12:40:10.624  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 12:40:10.625  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 12:40:10.633  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 12:40:10.634  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 12:40:10.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 12:40:10.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 12:40:10.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 12:40:10.648 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 12:40:10.648 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 12:40:10.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 12:40:10.656 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 12:40:10.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: b7228a9348bda613a1d20885997688969aa7a0e2414db7a8b5d1315975d3e1930d2671c1605531e03f87a7ef88a960e174d1cb1b2faa385165d6b1161d185e588110a9398c361d605a5a80829e9963da4c62819c0847d6b6c54a7851dd504531057003347478e5a35db615e297a3b7d70ebc60b79c4528aa100dc2b4c1a7b713943807983e67d21ce0406783e39e8b51e9fa0274d4a2a3e1fc471c4270bb6d5cbba7faac30ea8cc76a23e698059740e535844afc7a5d34553e0055500d6f6f53cd9d42c98f98c31854e16277a411979a3258f98a04a491f485bac709a94e10bc8d7429c48363229ea7449b11c54601b76f0c31c2447d1641c9de93dcf5fbf00044deb2c32243de6ddb5422e3020c62e95b4e12fb85dcc967d781ff61de08728a2c79252e6ca1af7211fca0b10e824e226318c4965ee95d509b1b9411855b12defc4ec77d90fb0df88539a9475ba79ee0765d43c87ff76b2517dc68386c7d961d3723a4b53c46708533f9b15230a63ff5fd9ef5253ced7f618f0c8a589136711b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:c5:00:8b:a8:68:91:70:f3:08:00:f3:da:29:d6:6d:16:4d:ea:ae] modulus: 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 public exponent: 10001 ] 2021-09-03 14:32:04.047  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 14:32:04.051 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 14:32:04.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-03 14:32:04.056 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 14:32:04.057  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-03 14:32:04.058  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 14:32:04.059  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 14:32:04.059  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 14:32:04.060  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 14:32:04.075  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 14:32:04.076  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:32:04.077  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:32:04.080  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 14:32:04.212  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 14:32:04.214  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 14:32:04.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 14:32:04.223 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 14:32:04.226  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 14:32:04.227  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 14:32:04.230  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 14:32:04.231  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 14:32:04.232  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 14:32:04.233  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 14:32:04.234 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:32:04.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:32:04.236 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:32:04.240 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:32:04.240 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:32:04.241 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:32:04.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 14:32:04.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:f6:44:19:8d:77:7a:9b:72:b2:31:48:3b:fc:bf:cc:ae:17:e2:5c] modulus: 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 public exponent: 10001 ] 2021-09-03 14:34:33.419  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 14:34:33.422 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 14:34:33.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-03 14:34:33.426 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 14:34:33.426  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-03 14:34:33.427  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 14:34:33.428  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 14:34:33.429  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 14:34:33.429  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 14:34:33.435  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 14:34:33.436  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:34:33.436  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:34:33.438  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 14:34:33.595  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 14:34:33.596  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 14:34:33.596 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 14:34:33.599 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 14:34:33.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 14:34:33.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 14:34:33.601  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 14:34:33.602  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 14:34:33.602  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 14:34:33.603  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 14:34:33.603 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:34:33.604 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:34:33.604 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:34:33.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:34:33.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:34:33.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:34:33.607 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 14:34:33.611 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:14:f2:f9:75:51:4f:9c:c7:0c:9b:fd:ff:99:3c:05:df:57:93:7d] modulus: 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 public exponent: 10001 ] 2021-09-03 14:36:09.509  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 14:36:09.512 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 14:36:09.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-03 14:36:09.516 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 14:36:09.516  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-03 14:36:09.517  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 14:36:09.518  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 14:36:09.518  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 14:36:09.519  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 14:36:09.525  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 14:36:09.526  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:36:09.527  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:36:09.528  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 14:36:09.665  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 14:36:09.666  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 14:36:09.667 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 14:36:09.670 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 14:36:09.671  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 14:36:09.672  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 14:36:09.674  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 14:36:09.674  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 14:36:09.676  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 14:36:09.679  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 14:36:09.680 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:36:09.680 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:36:09.681 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:36:09.682 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:36:09.682 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:36:09.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:36:09.684 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 14:36:09.688 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:d5:9e:5e:f8:95:a1:e5:33:90:56:f4:89:a5:c3:64:17:e9:6f:43] modulus: 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 public exponent: 10001 ] 2021-09-03 14:37:58.030  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 14:37:58.033 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 14:37:58.035 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-03 14:37:58.036 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 14:37:58.037  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-03 14:37:58.038  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 14:37:58.039  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 14:37:58.040  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 14:37:58.041  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 14:37:58.046  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 14:37:58.047  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:37:58.048  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:37:58.049  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 14:37:58.201  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 14:37:58.203  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 14:37:58.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 14:37:58.206 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 14:37:58.207  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 14:37:58.207  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 14:37:58.209  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 14:37:58.209  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 14:37:58.210  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 14:37:58.211  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 14:37:58.212 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:37:58.212 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:37:58.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:37:58.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:37:58.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:37:58.214 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:37:58.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 14:37:58.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:a8:73:5d:73:75:14:32:32:5c:12:56:19:19:ec:f1:67:33:05:ee] modulus: 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 public exponent: 10001 ] 2021-09-03 14:38:31.000  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 14:38:31.002 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 14:38:31.005 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-03 14:38:31.006 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 14:38:31.007  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-03 14:38:31.007  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 14:38:31.008  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 14:38:31.009  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 14:38:31.009  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 14:38:31.016  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 14:38:31.017  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:38:31.017  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:38:31.019  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 14:38:31.132  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 14:38:31.134  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 14:38:31.134 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 14:38:31.136 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 14:38:31.137  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 14:38:31.138  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 14:38:31.139  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 14:38:31.139  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 14:38:31.140  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 14:38:31.140  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 14:38:31.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:38:31.141 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:38:31.141 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:38:31.142 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:38:31.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:38:31.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:38:31.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 14:38:31.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: b7228a9348bda613a1d20885997688969aa7a0e2414db7a8b5d1315975d3e1930d2671c1605531e03f87a7ef88a960e174d1cb1b2faa385165d6b1161d185e588110a9398c361d605a5a80829e9963da4c62819c0847d6b6c54a7851dd504531057003347478e5a35db615e297a3b7d70ebc60b79c4528aa100dc2b4c1a7b713943807983e67d21ce0406783e39e8b51e9fa0274d4a2a3e1fc471c4270bb6d5cbba7faac30ea8cc76a23e698059740e535844afc7a5d34553e0055500d6f6f53cd9d42c98f98c31854e16277a411979a3258f98a04a491f485bac709a94e10bc8d7429c48363229ea7449b11c54601b76f0c31c2447d1641c9de93dcf5fbf00044deb2c32243de6ddb5422e3020c62e95b4e12fb85dcc967d781ff61de08728a2c79252e6ca1af7211fca0b10e824e226318c4965ee95d509b1b9411855b12defc4ec77d90fb0df88539a9475ba79ee0765d43c87ff76b2517dc68386c7d961d3723a4b53c46708533f9b15230a63ff5fd9ef5253ced7f618f0c8a589136711b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4c:63:c5:a8:d3:19:5a:dd:24:16:0a:51:8c:6b:e2:94:3d:d5:96:b5] modulus: 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 public exponent: 10001 ] 2021-09-03 14:39:04.580  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 14:39:04.583 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 14:39:04.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-03 14:39:04.586 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 14:39:04.587  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-03 14:39:04.589  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 14:39:04.590  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 14:39:04.593  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 14:39:04.594  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 14:39:04.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 14:39:04.601  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:39:04.601  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:39:04.603  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 14:39:04.699  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 14:39:04.700  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 14:39:04.700 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 14:39:04.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 14:39:04.702  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 14:39:04.703  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 14:39:04.704  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 14:39:04.705  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 14:39:04.705  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 14:39:04.705  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 14:39:04.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:39:04.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:39:04.707 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:39:04.707 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:39:04.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:39:04.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:39:04.709 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 14:39:04.712 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2d:5e:5d:8b:a8:57:f5:2a:57:1e:47:1f:a7:19:22:0d:39:1a:87:2b] modulus: 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 public exponent: 10001 ] 2021-09-03 14:40:02.127  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 14:40:02.129 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 14:40:02.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-03 14:40:02.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 14:40:02.133  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-03 14:40:02.134  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 14:40:02.135  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 14:40:02.135  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 14:40:02.136  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 14:40:02.144  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 14:40:02.145  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:40:02.145  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:40:02.147  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 14:40:02.288  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 14:40:02.289  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 14:40:02.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 14:40:02.291 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 14:40:02.292  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 14:40:02.292  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 14:40:02.294  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 14:40:02.295  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 14:40:02.296  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 14:40:02.296  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 14:40:02.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:40:02.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:40:02.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:40:02.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:40:02.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:40:02.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:40:02.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 14:40:02.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:a4:0b:15:5e:0f:50:1e:90:e0:14:a2:a4:3a:c5:9e:90:13:9a:78] modulus: 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 public exponent: 10001 ] 2021-09-03 14:40:50.099  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 14:40:50.102 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 14:40:50.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-03 14:40:50.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 14:40:50.108  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-03 14:40:50.109  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 14:40:50.110  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 14:40:50.110  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 14:40:50.111  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 14:40:50.118  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 14:40:50.120  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:40:50.121  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 14:40:50.123  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 14:40:50.234  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 14:40:50.235  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 14:40:50.235 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 14:40:50.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 14:40:50.238  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 14:40:50.239  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 14:40:50.240  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 14:40:50.240  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 14:40:50.241  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 14:40:50.242  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 14:40:50.242 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:40:50.243 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:40:50.243 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:40:50.244 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 14:40:50.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 14:40:50.245 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 14:40:50.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 14:40:50.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: b7228a9348bda613a1d20885997688969aa7a0e2414db7a8b5d1315975d3e1930d2671c1605531e03f87a7ef88a960e174d1cb1b2faa385165d6b1161d185e588110a9398c361d605a5a80829e9963da4c62819c0847d6b6c54a7851dd504531057003347478e5a35db615e297a3b7d70ebc60b79c4528aa100dc2b4c1a7b713943807983e67d21ce0406783e39e8b51e9fa0274d4a2a3e1fc471c4270bb6d5cbba7faac30ea8cc76a23e698059740e535844afc7a5d34553e0055500d6f6f53cd9d42c98f98c31854e16277a411979a3258f98a04a491f485bac709a94e10bc8d7429c48363229ea7449b11c54601b76f0c31c2447d1641c9de93dcf5fbf00044deb2c32243de6ddb5422e3020c62e95b4e12fb85dcc967d781ff61de08728a2c79252e6ca1af7211fca0b10e824e226318c4965ee95d509b1b9411855b12defc4ec77d90fb0df88539a9475ba79ee0765d43c87ff76b2517dc68386c7d961d3723a4b53c46708533f9b15230a63ff5fd9ef5253ced7f618f0c8a589136711b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:f8:15:b7:1b:cf:84:f4:ea:30:8b:38:4a:4d:5b:c3:1c:37:3a:7a] modulus: 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 public exponent: 10001 ] 2021-09-03 15:03:26.114  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 15:03:26.117 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 15:03:26.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-03 15:03:26.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 15:03:26.121  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-03 15:03:26.122  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 15:03:26.122  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 15:03:26.123  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 15:03:26.123  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 15:03:26.128  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 15:03:26.129  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 15:03:26.130  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 15:03:26.131  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 15:03:26.247  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 15:03:26.248  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 15:03:26.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 15:03:26.250 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 15:03:26.250  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 15:03:26.251  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 15:03:26.252  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 15:03:26.252  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 15:03:26.253  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 15:03:26.253  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 15:03:26.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 15:03:26.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 15:03:26.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 15:03:26.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 15:03:26.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 15:03:26.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 15:03:26.257 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 15:03:26.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:27:08:f7:3e:75:c5:18:97:c7:68:aa:eb:1f:d3:dc:86:73:a9:3d] modulus: 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 public exponent: 10001 ] 2021-09-03 15:07:35.924  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 15:07:35.926 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 15:07:35.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-03 15:07:35.929 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 15:07:35.929  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-03 15:07:35.930  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 15:07:35.930  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 15:07:35.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 15:07:35.931  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 15:07:35.936  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 15:07:35.937  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 15:07:35.937  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 15:07:35.939  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 15:07:36.050  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 15:07:36.051  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 15:07:36.051 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 15:07:36.053 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 15:07:36.053  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 15:07:36.054  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 15:07:36.055  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 15:07:36.055  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 15:07:36.056  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 15:07:36.056  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 15:07:36.057 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 15:07:36.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 15:07:36.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 15:07:36.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 15:07:36.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 15:07:36.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 15:07:36.062 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 15:07:36.066 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:89:19:50:da:8a:41:ea:59:14:e8:d6:42:39:f6:13:90:9c:29:6a] modulus: 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 public exponent: 10001 ] 2021-09-03 15:08:07.388  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 15:08:07.389 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 15:08:07.390 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-03 15:08:07.391 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 15:08:07.391  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-03 15:08:07.392  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 15:08:07.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 15:08:07.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 15:08:07.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 15:08:07.398  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 15:08:07.398  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 15:08:07.399  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 15:08:07.401  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 15:08:07.481  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 15:08:07.481  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 15:08:07.482 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 15:08:07.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 15:08:07.484  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 15:08:07.484  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 15:08:07.485  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 15:08:07.486  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 15:08:07.486  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 15:08:07.486  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 15:08:07.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 15:08:07.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 15:08:07.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 15:08:07.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 15:08:07.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 15:08:07.489 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 15:08:07.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 15:08:07.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: b7228a9348bda613a1d20885997688969aa7a0e2414db7a8b5d1315975d3e1930d2671c1605531e03f87a7ef88a960e174d1cb1b2faa385165d6b1161d185e588110a9398c361d605a5a80829e9963da4c62819c0847d6b6c54a7851dd504531057003347478e5a35db615e297a3b7d70ebc60b79c4528aa100dc2b4c1a7b713943807983e67d21ce0406783e39e8b51e9fa0274d4a2a3e1fc471c4270bb6d5cbba7faac30ea8cc76a23e698059740e535844afc7a5d34553e0055500d6f6f53cd9d42c98f98c31854e16277a411979a3258f98a04a491f485bac709a94e10bc8d7429c48363229ea7449b11c54601b76f0c31c2447d1641c9de93dcf5fbf00044deb2c32243de6ddb5422e3020c62e95b4e12fb85dcc967d781ff61de08728a2c79252e6ca1af7211fca0b10e824e226318c4965ee95d509b1b9411855b12defc4ec77d90fb0df88539a9475ba79ee0765d43c87ff76b2517dc68386c7d961d3723a4b53c46708533f9b15230a63ff5fd9ef5253ced7f618f0c8a589136711b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:12:72:f7:0a:67:c3:fd:c7:1b:1f:85:0f:f3:f1:f4:36:c4:dc:81] modulus: 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 public exponent: 10001 ] 2021-09-03 15:08:41.075  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-03 15:08:41.081 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-03 15:08:41.089 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-03 15:08:41.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-03 15:08:41.093  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-03 15:08:41.095  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-03 15:08:41.096  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-03 15:08:41.097  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-03 15:08:41.099  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-03 15:08:41.109  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-03 15:08:41.111  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 15:08:41.111  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-03 15:08:41.113  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-03 15:08:41.243  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-03 15:08:41.243  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-03 15:08:41.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-03 15:08:41.265 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-03 15:08:41.266  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1487 2021-09-03 15:08:41.266  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-03 15:08:41.268  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-03 15:08:41.268  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-03 15:08:41.268  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-03 15:08:41.269  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-03 15:08:41.269 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 15:08:41.269 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 15:08:41.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 15:08:41.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-03 15:08:41.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-03 15:08:41.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-03 15:08:41.272 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-03 15:08:41.276 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 646374043474019339143341168235477231533210661586 IssuerDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Sep 03 12:33:05 UTC 2021 Final Date: Wed Sep 03 12:33:04 UTC 2031 SubjectDN: UID=c-0lfdun24yf90wktqi,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [17:fe:6d:60:3f:59:7f:df:5f:2f:ed:06:43:3b:b0:d3:4d:48:d9:64] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b163a23a39580ceeea33fc89a5de3ab5485244c8 eb76d2de919cd01dee52406c1449a03a9e89d1ff fb161862a5b5478a8895a41b4695aca87a25052a 5b5285fafac7727305836662e2c02edcd9d01ec6 e5c841c896f04ea5bd477d819f211fcb22ec1855 2470e9fabd6f8a42075ba86b7187a9a211c3ae22 3c2a6a2f039b178d1ce91cf3a9bcb3d879a33dd7 74f17775b808cfdc1bc1df32c789670f6f5c418a 1bf654d22197cf6b152010a974a27a3b8091a9d5 34b7aa9ba73abf45de2549610c807170b9e83490 d29beaa38c8dfe0e97d34e58b432022a415cd042 aeee095777b7a102c40b494257844b1eb7cbf559 04f8251d4dc928313bac5f7113c6d0f3bd420494 e591932b7fb68b46702c936b592753d631c9b0e3 14b862690bb356a305db1c77545bcf844426616e c16225320069170cf24da3bb75fc15980d1993ac a9af3fd0900bc41820c1b3eaee4b638f6f8b36bc 445def441d1ca421f4f3ca8df9e83e3eb4b3b2bc 2ba57f4427467ad5ca834a3c0cab12356c1ecd5a 9fcd8520 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:b5:d1:cd:ed:00:77:db:08:88:39:86:14:d9:cd:ae:9a:be:31:8b] modulus: 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 public exponent: 10001 ]