2021-09-04 05:54:08,050 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-04 05:54:08,898 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-04 05:54:09.543  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-09-04 05:54:12.004 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-04 05:54:12.257  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-09-04 05:54:12.440  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-04 05:54:14.816  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.36 seconds (JVM running for 9.347) 2021-09-04 05:58:19.155  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 05:58:19.170 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 05:58:19.223 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-04 05:58:19.232 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 05:58:19.260  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-04 05:58:19.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 05:58:19.276  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 05:58:19.278  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 05:58:19.279  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 05:58:19.301  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 05:58:19.306  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 05:58:19.374  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 05:58:19.408  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 05:58:19.409  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 05:58:19.456  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 05:58:20.159  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 05:58:20.163  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 05:58:20.164 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 05:58:20.171 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 05:58:20.173  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1189 2021-09-04 05:58:20.173  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 05:58:20.177  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 05:58:20.178  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 05:58:20.185  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 05:58:20.187  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 05:58:20.188 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 05:58:20.188 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 05:58:20.189 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 05:58:20.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 05:58:20.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 05:58:20.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 05:58:20.209 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 05:58:20.244 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 157322810068299487717417529241431890136431488344 IssuerDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 05:50:02 UTC 2021 Final Date: Thu Sep 04 05:50:01 UTC 2031 SubjectDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:15:e2:7e:71:45:34:58:63:69:f3:1e:07:14:50:44:58:a9:37:29] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a46cd20404b05e90edc9767d3601f7356ca7a309 b5bc15dcfcc4f9f6dbc6b5e9adbfd80509ff4bf0 6a6bc49c0d8856e90059693fbde490da8d7cb5bc 7543a207d1fc730ac7bf8b0a68b4ece35cd72463 3bcb239d54625126a165196c900e2e862e6ad9d9 4eefbdf1a6aae43a9ee673a21eac31dddfc6c8db 15903349120429ed34cc4022e35cab5807b759e5 63683ce98789851c438cce1aa4cebe1b2417e79e 4426dba67884d7b170fe312b2f90ded10591a103 9d3d6aa6537a5effd15c3968409f316042ee205b c6a09acb3c97d9d89794c86711f9ac051270a370 dc54f7aa7d76d9c708cff97b4986855dc60d49f0 b23255b1d23f881b9e981f4b80e4d34372a1f849 142542a92eda3baa3bb23cfea8854ac9b3959731 b79e8ca0d98d17664fdbb1357bb47640c38aa61a 3ad6339cb328df37a0f5897c68ceb3409953bc28 957568b8daecd2a651972abba97c4ca8c65dfe1f 99e6cf50bc40bcfe9582c5280c5cfe79d9e429fd 476105e31b4bcb5fb00898d5695d68f4cd44c500 fc0ae460 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:83:62:f2:4c:5c:59:90:2f:6e:d2:74:73:d3:0f:8a:ba:aa:0c:be] modulus: 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 public exponent: 10001 ] 2021-09-04 08:26:16.640  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 08:26:16.643 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 08:26:16.647 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-04 08:26:16.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 08:26:16.650  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-04 08:26:16.652  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 08:26:16.653  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 08:26:16.654  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 08:26:16.655  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 08:26:16.672  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 08:26:16.674  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:26:16.675  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:26:16.678  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 08:26:16.829  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 08:26:16.830  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 08:26:16.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 08:26:16.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 08:26:16.834  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1189 2021-09-04 08:26:16.835  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 08:26:16.836  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 08:26:16.837  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 08:26:16.838  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 08:26:16.838  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 08:26:16.838 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:26:16.839 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:26:16.839 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:26:16.840 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:26:16.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:26:16.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:26:16.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 08:26:16.849 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 157322810068299487717417529241431890136431488344 IssuerDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 05:50:02 UTC 2021 Final Date: Thu Sep 04 05:50:01 UTC 2031 SubjectDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:15:e2:7e:71:45:34:58:63:69:f3:1e:07:14:50:44:58:a9:37:29] modulus: b5a3b6ab6f0992d490f92c61f98facdc8a8385f96a8f8abd4f86b1a03815b70f1234f0ea1959ee228e363d8394b5e687e8bd1cf0fe462e59a8b681b0241c4aa235ca6bca747a847bd0564d03bde48dd7853e85e48d4bbeb9f7609a60aa4aa1ccfd479734b3105b5c3e6b8d628b92c631e4f3bae3b3041160832a265e843ff44b65ec0cddc36863d2f35bf4eb2c222eb5abe5aa136863a4bbfe31960de628143896bfe9a74d47112734e5d970a181a1ca5137b400e417c4f00c753076b3cf80c5177d3659684ac3afb023277aefab331bbe9f670fb90f77245105f321106ac97823ce22ce504d048b5dd4e67e7c0c55f63451142db3a192c5ee9edd254bbb74370c7c41b0aaf667b442cb2bc2fe944280d447f77b7873d77f1f4bddc46d35dd7626622e685331fa64bb3dd7cc2c37e9665be765555e144962f873aa76e6390b7ae1b1435b414d44e1a0d527e75e35ed7ee1327e1e90ebe1ae41eab2ccabb230e3fffca9becca81147adf885feb53ef6b6833a4ee1c45ba4cf61d65ad1915e0de1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a46cd20404b05e90edc9767d3601f7356ca7a309 b5bc15dcfcc4f9f6dbc6b5e9adbfd80509ff4bf0 6a6bc49c0d8856e90059693fbde490da8d7cb5bc 7543a207d1fc730ac7bf8b0a68b4ece35cd72463 3bcb239d54625126a165196c900e2e862e6ad9d9 4eefbdf1a6aae43a9ee673a21eac31dddfc6c8db 15903349120429ed34cc4022e35cab5807b759e5 63683ce98789851c438cce1aa4cebe1b2417e79e 4426dba67884d7b170fe312b2f90ded10591a103 9d3d6aa6537a5effd15c3968409f316042ee205b c6a09acb3c97d9d89794c86711f9ac051270a370 dc54f7aa7d76d9c708cff97b4986855dc60d49f0 b23255b1d23f881b9e981f4b80e4d34372a1f849 142542a92eda3baa3bb23cfea8854ac9b3959731 b79e8ca0d98d17664fdbb1357bb47640c38aa61a 3ad6339cb328df37a0f5897c68ceb3409953bc28 957568b8daecd2a651972abba97c4ca8c65dfe1f 99e6cf50bc40bcfe9582c5280c5cfe79d9e429fd 476105e31b4bcb5fb00898d5695d68f4cd44c500 fc0ae460 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:1a:42:ac:a8:ba:00:74:50:fb:4d:8b:d8:6a:ca:81:aa:b3:f3:9e] modulus: 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 public exponent: 10001 ] 2021-09-04 08:28:21.238  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 08:28:21.241 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 08:28:21.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-04 08:28:21.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 08:28:21.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-04 08:28:21.247  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 08:28:21.248  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 08:28:21.248  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 08:28:21.249  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 08:28:21.260  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 08:28:21.262  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:28:21.263  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:28:21.266  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 08:28:21.406  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 08:28:21.407  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 08:28:21.407 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 08:28:21.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 08:28:21.411  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1189 2021-09-04 08:28:21.411  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 08:28:21.412  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 08:28:21.413  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 08:28:21.414  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 08:28:21.414  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 08:28:21.415 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:28:21.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:28:21.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:28:21.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:28:21.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:28:21.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:28:21.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 08:28:21.424 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 157322810068299487717417529241431890136431488344 IssuerDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 05:50:02 UTC 2021 Final Date: Thu Sep 04 05:50:01 UTC 2031 SubjectDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:15:e2:7e:71:45:34:58:63:69:f3:1e:07:14:50:44:58:a9:37:29] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a46cd20404b05e90edc9767d3601f7356ca7a309 b5bc15dcfcc4f9f6dbc6b5e9adbfd80509ff4bf0 6a6bc49c0d8856e90059693fbde490da8d7cb5bc 7543a207d1fc730ac7bf8b0a68b4ece35cd72463 3bcb239d54625126a165196c900e2e862e6ad9d9 4eefbdf1a6aae43a9ee673a21eac31dddfc6c8db 15903349120429ed34cc4022e35cab5807b759e5 63683ce98789851c438cce1aa4cebe1b2417e79e 4426dba67884d7b170fe312b2f90ded10591a103 9d3d6aa6537a5effd15c3968409f316042ee205b c6a09acb3c97d9d89794c86711f9ac051270a370 dc54f7aa7d76d9c708cff97b4986855dc60d49f0 b23255b1d23f881b9e981f4b80e4d34372a1f849 142542a92eda3baa3bb23cfea8854ac9b3959731 b79e8ca0d98d17664fdbb1357bb47640c38aa61a 3ad6339cb328df37a0f5897c68ceb3409953bc28 957568b8daecd2a651972abba97c4ca8c65dfe1f 99e6cf50bc40bcfe9582c5280c5cfe79d9e429fd 476105e31b4bcb5fb00898d5695d68f4cd44c500 fc0ae460 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:bc:ab:66:cc:89:23:05:9c:cd:44:ac:e8:35:43:48:58:68:66:85] modulus: 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 public exponent: 10001 ] 2021-09-04 08:30:15.899  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 08:30:15.902 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 08:30:15.905 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-04 08:30:15.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 08:30:15.908  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-04 08:30:15.909  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 08:30:15.910  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 08:30:15.911  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 08:30:15.912  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 08:30:15.932  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 08:30:15.934  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:30:15.936  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:30:15.938  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 08:30:16.063  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 08:30:16.064  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 08:30:16.065 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 08:30:16.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 08:30:16.069  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1189 2021-09-04 08:30:16.069  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 08:30:16.071  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 08:30:16.071  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 08:30:16.072  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 08:30:16.072  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 08:30:16.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:30:16.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:30:16.074 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:30:16.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:30:16.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:30:16.076 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:30:16.076 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 08:30:16.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 157322810068299487717417529241431890136431488344 IssuerDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 05:50:02 UTC 2021 Final Date: Thu Sep 04 05:50:01 UTC 2031 SubjectDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:15:e2:7e:71:45:34:58:63:69:f3:1e:07:14:50:44:58:a9:37:29] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a46cd20404b05e90edc9767d3601f7356ca7a309 b5bc15dcfcc4f9f6dbc6b5e9adbfd80509ff4bf0 6a6bc49c0d8856e90059693fbde490da8d7cb5bc 7543a207d1fc730ac7bf8b0a68b4ece35cd72463 3bcb239d54625126a165196c900e2e862e6ad9d9 4eefbdf1a6aae43a9ee673a21eac31dddfc6c8db 15903349120429ed34cc4022e35cab5807b759e5 63683ce98789851c438cce1aa4cebe1b2417e79e 4426dba67884d7b170fe312b2f90ded10591a103 9d3d6aa6537a5effd15c3968409f316042ee205b c6a09acb3c97d9d89794c86711f9ac051270a370 dc54f7aa7d76d9c708cff97b4986855dc60d49f0 b23255b1d23f881b9e981f4b80e4d34372a1f849 142542a92eda3baa3bb23cfea8854ac9b3959731 b79e8ca0d98d17664fdbb1357bb47640c38aa61a 3ad6339cb328df37a0f5897c68ceb3409953bc28 957568b8daecd2a651972abba97c4ca8c65dfe1f 99e6cf50bc40bcfe9582c5280c5cfe79d9e429fd 476105e31b4bcb5fb00898d5695d68f4cd44c500 fc0ae460 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:08:9c:c1:b8:a9:62:db:a1:8c:2e:dd:d2:25:ac:be:48:46:5a:48] modulus: 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 public exponent: 10001 ] 2021-09-04 08:30:28.804  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 08:30:28.805 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 08:30:28.807 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-04 08:30:28.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 08:30:28.809  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-04 08:30:28.810  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 08:30:28.810  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 08:30:28.811  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 08:30:28.812  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 08:30:28.824  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 08:30:28.825  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:30:28.826  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:30:28.827  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 08:30:28.937  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 08:30:28.938  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 08:30:28.938 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 08:30:28.944 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 08:30:28.946  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1189 2021-09-04 08:30:28.946  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 08:30:28.947  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 08:30:28.948  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 08:30:28.949  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 08:30:28.949  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 08:30:28.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:30:28.950 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:30:28.950 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:30:28.952 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:30:28.953 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:30:28.953 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:30:28.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 08:30:28.960 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 157322810068299487717417529241431890136431488344 IssuerDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 05:50:02 UTC 2021 Final Date: Thu Sep 04 05:50:01 UTC 2031 SubjectDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:15:e2:7e:71:45:34:58:63:69:f3:1e:07:14:50:44:58:a9:37:29] modulus: b5a3b6ab6f0992d490f92c61f98facdc8a8385f96a8f8abd4f86b1a03815b70f1234f0ea1959ee228e363d8394b5e687e8bd1cf0fe462e59a8b681b0241c4aa235ca6bca747a847bd0564d03bde48dd7853e85e48d4bbeb9f7609a60aa4aa1ccfd479734b3105b5c3e6b8d628b92c631e4f3bae3b3041160832a265e843ff44b65ec0cddc36863d2f35bf4eb2c222eb5abe5aa136863a4bbfe31960de628143896bfe9a74d47112734e5d970a181a1ca5137b400e417c4f00c753076b3cf80c5177d3659684ac3afb023277aefab331bbe9f670fb90f77245105f321106ac97823ce22ce504d048b5dd4e67e7c0c55f63451142db3a192c5ee9edd254bbb74370c7c41b0aaf667b442cb2bc2fe944280d447f77b7873d77f1f4bddc46d35dd7626622e685331fa64bb3dd7cc2c37e9665be765555e144962f873aa76e6390b7ae1b1435b414d44e1a0d527e75e35ed7ee1327e1e90ebe1ae41eab2ccabb230e3fffca9becca81147adf885feb53ef6b6833a4ee1c45ba4cf61d65ad1915e0de1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a46cd20404b05e90edc9767d3601f7356ca7a309 b5bc15dcfcc4f9f6dbc6b5e9adbfd80509ff4bf0 6a6bc49c0d8856e90059693fbde490da8d7cb5bc 7543a207d1fc730ac7bf8b0a68b4ece35cd72463 3bcb239d54625126a165196c900e2e862e6ad9d9 4eefbdf1a6aae43a9ee673a21eac31dddfc6c8db 15903349120429ed34cc4022e35cab5807b759e5 63683ce98789851c438cce1aa4cebe1b2417e79e 4426dba67884d7b170fe312b2f90ded10591a103 9d3d6aa6537a5effd15c3968409f316042ee205b c6a09acb3c97d9d89794c86711f9ac051270a370 dc54f7aa7d76d9c708cff97b4986855dc60d49f0 b23255b1d23f881b9e981f4b80e4d34372a1f849 142542a92eda3baa3bb23cfea8854ac9b3959731 b79e8ca0d98d17664fdbb1357bb47640c38aa61a 3ad6339cb328df37a0f5897c68ceb3409953bc28 957568b8daecd2a651972abba97c4ca8c65dfe1f 99e6cf50bc40bcfe9582c5280c5cfe79d9e429fd 476105e31b4bcb5fb00898d5695d68f4cd44c500 fc0ae460 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:e5:01:ca:72:5e:e6:92:17:46:e8:92:eb:45:ce:b7:a5:81:33:ba] modulus: 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 public exponent: 10001 ] 2021-09-04 08:31:03.634  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 08:31:03.638 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 08:31:03.640 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-04 08:31:03.641 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 08:31:03.642  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-04 08:31:03.642  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 08:31:03.643  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 08:31:03.644  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 08:31:03.644  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 08:31:03.656  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 08:31:03.657  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:31:03.658  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:31:03.660  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 08:31:03.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 08:31:03.770  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 08:31:03.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 08:31:03.772 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 08:31:03.773  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1189 2021-09-04 08:31:03.779  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 08:31:03.780  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 08:31:03.781  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 08:31:03.781  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 08:31:03.782  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 08:31:03.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:31:03.783 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:31:03.784 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:31:03.785 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:31:03.785 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:31:03.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:31:03.788 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 08:31:03.792 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 157322810068299487717417529241431890136431488344 IssuerDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 05:50:02 UTC 2021 Final Date: Thu Sep 04 05:50:01 UTC 2031 SubjectDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:15:e2:7e:71:45:34:58:63:69:f3:1e:07:14:50:44:58:a9:37:29] modulus: b5a3b6ab6f0992d490f92c61f98facdc8a8385f96a8f8abd4f86b1a03815b70f1234f0ea1959ee228e363d8394b5e687e8bd1cf0fe462e59a8b681b0241c4aa235ca6bca747a847bd0564d03bde48dd7853e85e48d4bbeb9f7609a60aa4aa1ccfd479734b3105b5c3e6b8d628b92c631e4f3bae3b3041160832a265e843ff44b65ec0cddc36863d2f35bf4eb2c222eb5abe5aa136863a4bbfe31960de628143896bfe9a74d47112734e5d970a181a1ca5137b400e417c4f00c753076b3cf80c5177d3659684ac3afb023277aefab331bbe9f670fb90f77245105f321106ac97823ce22ce504d048b5dd4e67e7c0c55f63451142db3a192c5ee9edd254bbb74370c7c41b0aaf667b442cb2bc2fe944280d447f77b7873d77f1f4bddc46d35dd7626622e685331fa64bb3dd7cc2c37e9665be765555e144962f873aa76e6390b7ae1b1435b414d44e1a0d527e75e35ed7ee1327e1e90ebe1ae41eab2ccabb230e3fffca9becca81147adf885feb53ef6b6833a4ee1c45ba4cf61d65ad1915e0de1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a46cd20404b05e90edc9767d3601f7356ca7a309 b5bc15dcfcc4f9f6dbc6b5e9adbfd80509ff4bf0 6a6bc49c0d8856e90059693fbde490da8d7cb5bc 7543a207d1fc730ac7bf8b0a68b4ece35cd72463 3bcb239d54625126a165196c900e2e862e6ad9d9 4eefbdf1a6aae43a9ee673a21eac31dddfc6c8db 15903349120429ed34cc4022e35cab5807b759e5 63683ce98789851c438cce1aa4cebe1b2417e79e 4426dba67884d7b170fe312b2f90ded10591a103 9d3d6aa6537a5effd15c3968409f316042ee205b c6a09acb3c97d9d89794c86711f9ac051270a370 dc54f7aa7d76d9c708cff97b4986855dc60d49f0 b23255b1d23f881b9e981f4b80e4d34372a1f849 142542a92eda3baa3bb23cfea8854ac9b3959731 b79e8ca0d98d17664fdbb1357bb47640c38aa61a 3ad6339cb328df37a0f5897c68ceb3409953bc28 957568b8daecd2a651972abba97c4ca8c65dfe1f 99e6cf50bc40bcfe9582c5280c5cfe79d9e429fd 476105e31b4bcb5fb00898d5695d68f4cd44c500 fc0ae460 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:7a:fb:6b:42:6b:b1:08:b4:69:52:91:3c:d9:16:07:6d:19:c1:21] modulus: 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 public exponent: 10001 ] 2021-09-04 08:31:37.325  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 08:31:37.327 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 08:31:37.328 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-04 08:31:37.335 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 08:31:37.336  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-04 08:31:37.337  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 08:31:37.337  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 08:31:37.338  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 08:31:37.339  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 08:31:37.348  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 08:31:37.354  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:31:37.354  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:31:37.356  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 08:31:37.504  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 08:31:37.505  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 08:31:37.505 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 08:31:37.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 08:31:37.510  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1189 2021-09-04 08:31:37.510  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 08:31:37.511  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 08:31:37.519  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 08:31:37.521  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 08:31:37.521  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 08:31:37.522 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:31:37.522 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:31:37.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:31:37.524 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:31:37.526 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:31:37.527 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:31:37.528 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 08:31:37.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 157322810068299487717417529241431890136431488344 IssuerDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 05:50:02 UTC 2021 Final Date: Thu Sep 04 05:50:01 UTC 2031 SubjectDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:15:e2:7e:71:45:34:58:63:69:f3:1e:07:14:50:44:58:a9:37:29] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a46cd20404b05e90edc9767d3601f7356ca7a309 b5bc15dcfcc4f9f6dbc6b5e9adbfd80509ff4bf0 6a6bc49c0d8856e90059693fbde490da8d7cb5bc 7543a207d1fc730ac7bf8b0a68b4ece35cd72463 3bcb239d54625126a165196c900e2e862e6ad9d9 4eefbdf1a6aae43a9ee673a21eac31dddfc6c8db 15903349120429ed34cc4022e35cab5807b759e5 63683ce98789851c438cce1aa4cebe1b2417e79e 4426dba67884d7b170fe312b2f90ded10591a103 9d3d6aa6537a5effd15c3968409f316042ee205b c6a09acb3c97d9d89794c86711f9ac051270a370 dc54f7aa7d76d9c708cff97b4986855dc60d49f0 b23255b1d23f881b9e981f4b80e4d34372a1f849 142542a92eda3baa3bb23cfea8854ac9b3959731 b79e8ca0d98d17664fdbb1357bb47640c38aa61a 3ad6339cb328df37a0f5897c68ceb3409953bc28 957568b8daecd2a651972abba97c4ca8c65dfe1f 99e6cf50bc40bcfe9582c5280c5cfe79d9e429fd 476105e31b4bcb5fb00898d5695d68f4cd44c500 fc0ae460 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:0c:52:46:a7:ed:50:db:5c:cc:1d:bf:e9:cd:0a:c4:dc:65:e1:86] modulus: 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 public exponent: 10001 ] 2021-09-04 08:32:27.014  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 08:32:27.016 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 08:32:27.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-04 08:32:27.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 08:32:27.025  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-04 08:32:27.026  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 08:32:27.027  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 08:32:27.027  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 08:32:27.028  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 08:32:27.034  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 08:32:27.035  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:32:27.036  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:32:27.037  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 08:32:27.178  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 08:32:27.179  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 08:32:27.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 08:32:27.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 08:32:27.182  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1189 2021-09-04 08:32:27.182  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 08:32:27.185  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 08:32:27.186  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 08:32:27.186  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 08:32:27.187  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 08:32:27.188 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:32:27.188 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:32:27.189 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:32:27.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:32:27.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:32:27.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:32:27.192 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 08:32:27.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 157322810068299487717417529241431890136431488344 IssuerDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 05:50:02 UTC 2021 Final Date: Thu Sep 04 05:50:01 UTC 2031 SubjectDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:15:e2:7e:71:45:34:58:63:69:f3:1e:07:14:50:44:58:a9:37:29] modulus: b5a3b6ab6f0992d490f92c61f98facdc8a8385f96a8f8abd4f86b1a03815b70f1234f0ea1959ee228e363d8394b5e687e8bd1cf0fe462e59a8b681b0241c4aa235ca6bca747a847bd0564d03bde48dd7853e85e48d4bbeb9f7609a60aa4aa1ccfd479734b3105b5c3e6b8d628b92c631e4f3bae3b3041160832a265e843ff44b65ec0cddc36863d2f35bf4eb2c222eb5abe5aa136863a4bbfe31960de628143896bfe9a74d47112734e5d970a181a1ca5137b400e417c4f00c753076b3cf80c5177d3659684ac3afb023277aefab331bbe9f670fb90f77245105f321106ac97823ce22ce504d048b5dd4e67e7c0c55f63451142db3a192c5ee9edd254bbb74370c7c41b0aaf667b442cb2bc2fe944280d447f77b7873d77f1f4bddc46d35dd7626622e685331fa64bb3dd7cc2c37e9665be765555e144962f873aa76e6390b7ae1b1435b414d44e1a0d527e75e35ed7ee1327e1e90ebe1ae41eab2ccabb230e3fffca9becca81147adf885feb53ef6b6833a4ee1c45ba4cf61d65ad1915e0de1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a46cd20404b05e90edc9767d3601f7356ca7a309 b5bc15dcfcc4f9f6dbc6b5e9adbfd80509ff4bf0 6a6bc49c0d8856e90059693fbde490da8d7cb5bc 7543a207d1fc730ac7bf8b0a68b4ece35cd72463 3bcb239d54625126a165196c900e2e862e6ad9d9 4eefbdf1a6aae43a9ee673a21eac31dddfc6c8db 15903349120429ed34cc4022e35cab5807b759e5 63683ce98789851c438cce1aa4cebe1b2417e79e 4426dba67884d7b170fe312b2f90ded10591a103 9d3d6aa6537a5effd15c3968409f316042ee205b c6a09acb3c97d9d89794c86711f9ac051270a370 dc54f7aa7d76d9c708cff97b4986855dc60d49f0 b23255b1d23f881b9e981f4b80e4d34372a1f849 142542a92eda3baa3bb23cfea8854ac9b3959731 b79e8ca0d98d17664fdbb1357bb47640c38aa61a 3ad6339cb328df37a0f5897c68ceb3409953bc28 957568b8daecd2a651972abba97c4ca8c65dfe1f 99e6cf50bc40bcfe9582c5280c5cfe79d9e429fd 476105e31b4bcb5fb00898d5695d68f4cd44c500 fc0ae460 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:a9:a2:89:8f:af:a4:8c:9b:3c:8b:0e:78:96:b4:ad:d1:91:99:0f] modulus: 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 public exponent: 10001 ] 2021-09-04 08:33:22.994  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 08:33:22.997 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 08:33:22.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-04 08:33:23.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 08:33:23.001  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-04 08:33:23.002  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 08:33:23.003  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 08:33:23.004  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 08:33:23.004  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 08:33:23.009  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 08:33:23.011  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:33:23.011  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 08:33:23.012  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 08:33:23.138  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 08:33:23.139  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 08:33:23.139 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 08:33:23.140 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 08:33:23.141  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1189 2021-09-04 08:33:23.141  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 08:33:23.142  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 08:33:23.142  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 08:33:23.143  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 08:33:23.143  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 08:33:23.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:33:23.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:33:23.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:33:23.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 08:33:23.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 08:33:23.145 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 08:33:23.146 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 08:33:23.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 157322810068299487717417529241431890136431488344 IssuerDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 05:50:02 UTC 2021 Final Date: Thu Sep 04 05:50:01 UTC 2031 SubjectDN: UID=c-0xeg9rkvqjywjqu3d,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dd:15:e2:7e:71:45:34:58:63:69:f3:1e:07:14:50:44:58:a9:37:29] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a46cd20404b05e90edc9767d3601f7356ca7a309 b5bc15dcfcc4f9f6dbc6b5e9adbfd80509ff4bf0 6a6bc49c0d8856e90059693fbde490da8d7cb5bc 7543a207d1fc730ac7bf8b0a68b4ece35cd72463 3bcb239d54625126a165196c900e2e862e6ad9d9 4eefbdf1a6aae43a9ee673a21eac31dddfc6c8db 15903349120429ed34cc4022e35cab5807b759e5 63683ce98789851c438cce1aa4cebe1b2417e79e 4426dba67884d7b170fe312b2f90ded10591a103 9d3d6aa6537a5effd15c3968409f316042ee205b c6a09acb3c97d9d89794c86711f9ac051270a370 dc54f7aa7d76d9c708cff97b4986855dc60d49f0 b23255b1d23f881b9e981f4b80e4d34372a1f849 142542a92eda3baa3bb23cfea8854ac9b3959731 b79e8ca0d98d17664fdbb1357bb47640c38aa61a 3ad6339cb328df37a0f5897c68ceb3409953bc28 957568b8daecd2a651972abba97c4ca8c65dfe1f 99e6cf50bc40bcfe9582c5280c5cfe79d9e429fd 476105e31b4bcb5fb00898d5695d68f4cd44c500 fc0ae460 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:13:e4:c4:8c:12:c4:aa:13:34:5f:9e:ce:fe:7f:62:35:0a:59:c1] modulus: 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 public exponent: 10001 ]