2021-09-07 06:30:41,898 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-07 06:30:42,619 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-07 06:30:43.228  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-09-07 06:30:45.645 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-07 06:30:45.914  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-09-07 06:30:46.115  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-07 06:30:48.386  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.097 seconds (JVM running for 8.943) 2021-09-07 06:31:44.545  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-07 06:31:44.553 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-07 06:31:44.591 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-07 06:31:44.596 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-07 06:31:44.611  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-07 06:31:44.615  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-07 06:31:44.621  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-07 06:31:44.621  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 06:31:44.622  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-07 06:31:44.630  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-07 06:31:44.634  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-07 06:31:44.670  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-07 06:31:44.675  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 06:31:44.676  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 06:31:44.689  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-07 06:31:45.200  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-07 06:31:45.203  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-07 06:31:45.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-07 06:31:45.211 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-07 06:31:45.213  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1526 2021-09-07 06:31:45.214  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-07 06:31:45.218  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-07 06:31:45.219  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-07 06:31:45.226  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-07 06:31:45.227  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-07 06:31:45.227 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 06:31:45.228 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 06:31:45.229 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 06:31:45.241 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 06:31:45.241 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 06:31:45.242 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 06:31:45.249 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-07 06:31:45.276 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 326909869566544485714467184620060145468562201857 IssuerDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 07 06:21:36 UTC 2021 Final Date: Sun Sep 07 06:21:35 UTC 2031 SubjectDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:91:62:fc:3a:16:68:45:66:fd:29:a3:d8:4d:36:5d:b4:6a:d0:0f] modulus: d7df558cb40d520d881c78165a4837e9adc2199de3a68d337bf1ca1c446be1e2febbbb31c29a4d308b1764ea4e75ee0c207c8c524dfdfec75d3377747eeb07ec75b163f69eb9e7d83ae0490f086db472cc9e938267470d38d90b861a43fd725132b408d40b71072f1160acaf44a5b29d904681195a571126dd1642c2a0676d23ef8fe383bebfa333decb272358ba5d6a80a4ddc774d697ced474c2e9b9f68f7d3618519505e88698541dfc69f815e0bd99db880f6fd3f782aa1e4820ab657727f7ecceee92369d2ab7ebbe5dc3c415dfed1e58b83b9420635e5ae880d49c1c7131af209391ff410b7c61a8a8f58d4be15947950b80f807dc21f72efbe9e9e905703a836fd05d803a645fff98783c198068fae630b73bd76f1c7ffce109daf26a06dfad8bbf9b2ced1f773918d61008359931f801ed372c4839d89d0f4e7524e8fde40e9c3942a13d71d7db4bff1a89c30854696902d851f822a92ec014895bcc92290c06de75e92da101c5b67bae7e868c76b9c2b1d6645e67d9b4e4505b9321 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d7c736b09b7d7cbcaa9e7349a18af11053f69d56 bdacf5d296b7a1ed1163532cf6baabab021d6e50 03a177f91363e543160f229f3b33a08064a1e040 f6b038aa38e1fc936bf5185539e4a250c986d11e b096bae98845a044435ad08fada8bba20e5f7cb9 d6df4fc27e64da412bdac2c1b4896bb06601581e 61f8f622272d6922db9d981a9c1705b9b550ef37 9a3a24b16a351001b0b6710a87749f3ea0f58655 cfd7d43e85deaea86071f7f13b0ed3cf73846984 1cb9f5c38fe756f4e6a462b27c9540480077183c 6ab6af9444ecb9c95bae4496e9b9948a2e1b6613 9df1489452aefa95ead723c0c40758ffe0fc4e60 eec5b624e261c0632dc1ad11f2dfcc21bfffb94f cb88db99c454c000ba02b4bbb46c241d7042a1df 56d5bcef4cc37811d87d84fa7c4aae4f1c5b3671 1ac29c5a39794d376375689072816fefe8d9d111 0adcf0d331da7f8d6908e0693b6cfba93e81f005 0e2017ff497df4b972dd32c942f2e4f693fe9137 3c81ff8dccad070115a18fafa9e76f7df9542022 31a1e4cc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b2:28:3b:6d:fc:42:4d:3c:e0:3e:48:2c:01:e6:6b:de:c8:80:10:27] modulus: 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 public exponent: 10001 ] 2021-09-07 08:34:15.643  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-07 08:34:15.646 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-07 08:34:15.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-07 08:34:15.650 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-07 08:34:15.651  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-07 08:34:15.652  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-07 08:34:15.653  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-07 08:34:15.653  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-07 08:34:15.654  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-07 08:34:15.666  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-07 08:34:15.668  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:34:15.669  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:34:15.671  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-07 08:34:15.827  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-07 08:34:15.827  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-07 08:34:15.828 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-07 08:34:15.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-07 08:34:15.832  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1526 2021-09-07 08:34:15.832  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-07 08:34:15.834  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-07 08:34:15.838  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-07 08:34:15.838  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-07 08:34:15.839  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-07 08:34:15.839 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:34:15.840 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:34:15.840 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:34:15.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:34:15.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:34:15.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:34:15.844 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-07 08:34:15.849 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 326909869566544485714467184620060145468562201857 IssuerDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 07 06:21:36 UTC 2021 Final Date: Sun Sep 07 06:21:35 UTC 2031 SubjectDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:91:62:fc:3a:16:68:45:66:fd:29:a3:d8:4d:36:5d:b4:6a:d0:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d7c736b09b7d7cbcaa9e7349a18af11053f69d56 bdacf5d296b7a1ed1163532cf6baabab021d6e50 03a177f91363e543160f229f3b33a08064a1e040 f6b038aa38e1fc936bf5185539e4a250c986d11e b096bae98845a044435ad08fada8bba20e5f7cb9 d6df4fc27e64da412bdac2c1b4896bb06601581e 61f8f622272d6922db9d981a9c1705b9b550ef37 9a3a24b16a351001b0b6710a87749f3ea0f58655 cfd7d43e85deaea86071f7f13b0ed3cf73846984 1cb9f5c38fe756f4e6a462b27c9540480077183c 6ab6af9444ecb9c95bae4496e9b9948a2e1b6613 9df1489452aefa95ead723c0c40758ffe0fc4e60 eec5b624e261c0632dc1ad11f2dfcc21bfffb94f cb88db99c454c000ba02b4bbb46c241d7042a1df 56d5bcef4cc37811d87d84fa7c4aae4f1c5b3671 1ac29c5a39794d376375689072816fefe8d9d111 0adcf0d331da7f8d6908e0693b6cfba93e81f005 0e2017ff497df4b972dd32c942f2e4f693fe9137 3c81ff8dccad070115a18fafa9e76f7df9542022 31a1e4cc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:bb:2a:47:df:92:5d:19:04:d9:60:2f:46:23:76:5d:3e:ed:62:55] modulus: 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 public exponent: 10001 ] 2021-09-07 08:36:24.914  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-07 08:36:24.917 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-07 08:36:24.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-07 08:36:24.921 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-07 08:36:24.922  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-07 08:36:24.923  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-07 08:36:24.924  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-07 08:36:24.925  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-07 08:36:24.926  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-07 08:36:24.933  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-07 08:36:24.935  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:36:24.935  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:36:24.938  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-07 08:36:25.116  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-07 08:36:25.117  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-07 08:36:25.117 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-07 08:36:25.120 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-07 08:36:25.121  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1526 2021-09-07 08:36:25.122  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-07 08:36:25.124  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-07 08:36:25.124  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-07 08:36:25.125  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-07 08:36:25.125  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-07 08:36:25.126 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:36:25.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:36:25.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:36:25.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:36:25.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:36:25.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:36:25.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-07 08:36:25.136 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 326909869566544485714467184620060145468562201857 IssuerDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 07 06:21:36 UTC 2021 Final Date: Sun Sep 07 06:21:35 UTC 2031 SubjectDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:91:62:fc:3a:16:68:45:66:fd:29:a3:d8:4d:36:5d:b4:6a:d0:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d7c736b09b7d7cbcaa9e7349a18af11053f69d56 bdacf5d296b7a1ed1163532cf6baabab021d6e50 03a177f91363e543160f229f3b33a08064a1e040 f6b038aa38e1fc936bf5185539e4a250c986d11e b096bae98845a044435ad08fada8bba20e5f7cb9 d6df4fc27e64da412bdac2c1b4896bb06601581e 61f8f622272d6922db9d981a9c1705b9b550ef37 9a3a24b16a351001b0b6710a87749f3ea0f58655 cfd7d43e85deaea86071f7f13b0ed3cf73846984 1cb9f5c38fe756f4e6a462b27c9540480077183c 6ab6af9444ecb9c95bae4496e9b9948a2e1b6613 9df1489452aefa95ead723c0c40758ffe0fc4e60 eec5b624e261c0632dc1ad11f2dfcc21bfffb94f cb88db99c454c000ba02b4bbb46c241d7042a1df 56d5bcef4cc37811d87d84fa7c4aae4f1c5b3671 1ac29c5a39794d376375689072816fefe8d9d111 0adcf0d331da7f8d6908e0693b6cfba93e81f005 0e2017ff497df4b972dd32c942f2e4f693fe9137 3c81ff8dccad070115a18fafa9e76f7df9542022 31a1e4cc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:f6:77:8f:ba:00:53:32:34:3a:6c:e7:f1:60:f7:84:ab:28:ef:c4] modulus: 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 public exponent: 10001 ] 2021-09-07 08:37:54.742  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-07 08:37:54.745 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-07 08:37:54.748 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-07 08:37:54.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-07 08:37:54.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-07 08:37:54.751  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-07 08:37:54.752  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-07 08:37:54.753  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-07 08:37:54.754  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-07 08:37:54.763  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-07 08:37:54.764  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:37:54.765  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:37:54.766  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-07 08:37:54.918  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-07 08:37:54.919  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-07 08:37:54.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-07 08:37:54.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-07 08:37:54.923  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1526 2021-09-07 08:37:54.924  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-07 08:37:54.925  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-07 08:37:54.925  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-07 08:37:54.926  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-07 08:37:54.926  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-07 08:37:54.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:37:54.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:37:54.928 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:37:54.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:37:54.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:37:54.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:37:54.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-07 08:37:54.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 326909869566544485714467184620060145468562201857 IssuerDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 07 06:21:36 UTC 2021 Final Date: Sun Sep 07 06:21:35 UTC 2031 SubjectDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:91:62:fc:3a:16:68:45:66:fd:29:a3:d8:4d:36:5d:b4:6a:d0:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d7c736b09b7d7cbcaa9e7349a18af11053f69d56 bdacf5d296b7a1ed1163532cf6baabab021d6e50 03a177f91363e543160f229f3b33a08064a1e040 f6b038aa38e1fc936bf5185539e4a250c986d11e b096bae98845a044435ad08fada8bba20e5f7cb9 d6df4fc27e64da412bdac2c1b4896bb06601581e 61f8f622272d6922db9d981a9c1705b9b550ef37 9a3a24b16a351001b0b6710a87749f3ea0f58655 cfd7d43e85deaea86071f7f13b0ed3cf73846984 1cb9f5c38fe756f4e6a462b27c9540480077183c 6ab6af9444ecb9c95bae4496e9b9948a2e1b6613 9df1489452aefa95ead723c0c40758ffe0fc4e60 eec5b624e261c0632dc1ad11f2dfcc21bfffb94f cb88db99c454c000ba02b4bbb46c241d7042a1df 56d5bcef4cc37811d87d84fa7c4aae4f1c5b3671 1ac29c5a39794d376375689072816fefe8d9d111 0adcf0d331da7f8d6908e0693b6cfba93e81f005 0e2017ff497df4b972dd32c942f2e4f693fe9137 3c81ff8dccad070115a18fafa9e76f7df9542022 31a1e4cc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:7d:1a:4f:ef:49:1d:a8:3c:08:f6:b6:42:65:26:92:69:41:a8:fc] modulus: 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 public exponent: 10001 ] 2021-09-07 08:39:06.427  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-07 08:39:06.429 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-07 08:39:06.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-07 08:39:06.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-07 08:39:06.433  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-07 08:39:06.434  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-07 08:39:06.434  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-07 08:39:06.435  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-07 08:39:06.435  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-07 08:39:06.440  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-07 08:39:06.441  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:39:06.442  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:39:06.443  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-07 08:39:06.621  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-07 08:39:06.622  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-07 08:39:06.622 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-07 08:39:06.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-07 08:39:06.624  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1526 2021-09-07 08:39:06.624  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-07 08:39:06.625  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-07 08:39:06.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-07 08:39:06.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-07 08:39:06.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-07 08:39:06.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:39:06.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:39:06.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:39:06.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:39:06.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:39:06.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:39:06.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-07 08:39:06.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 326909869566544485714467184620060145468562201857 IssuerDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 07 06:21:36 UTC 2021 Final Date: Sun Sep 07 06:21:35 UTC 2031 SubjectDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:91:62:fc:3a:16:68:45:66:fd:29:a3:d8:4d:36:5d:b4:6a:d0:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d7c736b09b7d7cbcaa9e7349a18af11053f69d56 bdacf5d296b7a1ed1163532cf6baabab021d6e50 03a177f91363e543160f229f3b33a08064a1e040 f6b038aa38e1fc936bf5185539e4a250c986d11e b096bae98845a044435ad08fada8bba20e5f7cb9 d6df4fc27e64da412bdac2c1b4896bb06601581e 61f8f622272d6922db9d981a9c1705b9b550ef37 9a3a24b16a351001b0b6710a87749f3ea0f58655 cfd7d43e85deaea86071f7f13b0ed3cf73846984 1cb9f5c38fe756f4e6a462b27c9540480077183c 6ab6af9444ecb9c95bae4496e9b9948a2e1b6613 9df1489452aefa95ead723c0c40758ffe0fc4e60 eec5b624e261c0632dc1ad11f2dfcc21bfffb94f cb88db99c454c000ba02b4bbb46c241d7042a1df 56d5bcef4cc37811d87d84fa7c4aae4f1c5b3671 1ac29c5a39794d376375689072816fefe8d9d111 0adcf0d331da7f8d6908e0693b6cfba93e81f005 0e2017ff497df4b972dd32c942f2e4f693fe9137 3c81ff8dccad070115a18fafa9e76f7df9542022 31a1e4cc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:09:98:26:5d:2a:69:9a:5e:8a:10:06:36:13:75:e5:26:1d:1a:be] modulus: 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 public exponent: 10001 ] 2021-09-07 08:39:40.672  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-07 08:39:40.674 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-07 08:39:40.676 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-07 08:39:40.677 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-07 08:39:40.677  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-07 08:39:40.678  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-07 08:39:40.678  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-07 08:39:40.679  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-07 08:39:40.679  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-07 08:39:40.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-07 08:39:40.686  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:39:40.686  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:39:40.688  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-07 08:39:40.868  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-07 08:39:40.869  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-07 08:39:40.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-07 08:39:40.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-07 08:39:40.872  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1526 2021-09-07 08:39:40.872  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-07 08:39:40.873  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-07 08:39:40.874  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-07 08:39:40.875  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-07 08:39:40.875  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-07 08:39:40.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:39:40.876 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:39:40.876 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:39:40.877 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:39:40.878 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:39:40.878 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:39:40.879 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-07 08:39:40.883 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 326909869566544485714467184620060145468562201857 IssuerDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 07 06:21:36 UTC 2021 Final Date: Sun Sep 07 06:21:35 UTC 2031 SubjectDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:91:62:fc:3a:16:68:45:66:fd:29:a3:d8:4d:36:5d:b4:6a:d0:0f] modulus: d7df558cb40d520d881c78165a4837e9adc2199de3a68d337bf1ca1c446be1e2febbbb31c29a4d308b1764ea4e75ee0c207c8c524dfdfec75d3377747eeb07ec75b163f69eb9e7d83ae0490f086db472cc9e938267470d38d90b861a43fd725132b408d40b71072f1160acaf44a5b29d904681195a571126dd1642c2a0676d23ef8fe383bebfa333decb272358ba5d6a80a4ddc774d697ced474c2e9b9f68f7d3618519505e88698541dfc69f815e0bd99db880f6fd3f782aa1e4820ab657727f7ecceee92369d2ab7ebbe5dc3c415dfed1e58b83b9420635e5ae880d49c1c7131af209391ff410b7c61a8a8f58d4be15947950b80f807dc21f72efbe9e9e905703a836fd05d803a645fff98783c198068fae630b73bd76f1c7ffce109daf26a06dfad8bbf9b2ced1f773918d61008359931f801ed372c4839d89d0f4e7524e8fde40e9c3942a13d71d7db4bff1a89c30854696902d851f822a92ec014895bcc92290c06de75e92da101c5b67bae7e868c76b9c2b1d6645e67d9b4e4505b9321 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d7c736b09b7d7cbcaa9e7349a18af11053f69d56 bdacf5d296b7a1ed1163532cf6baabab021d6e50 03a177f91363e543160f229f3b33a08064a1e040 f6b038aa38e1fc936bf5185539e4a250c986d11e b096bae98845a044435ad08fada8bba20e5f7cb9 d6df4fc27e64da412bdac2c1b4896bb06601581e 61f8f622272d6922db9d981a9c1705b9b550ef37 9a3a24b16a351001b0b6710a87749f3ea0f58655 cfd7d43e85deaea86071f7f13b0ed3cf73846984 1cb9f5c38fe756f4e6a462b27c9540480077183c 6ab6af9444ecb9c95bae4496e9b9948a2e1b6613 9df1489452aefa95ead723c0c40758ffe0fc4e60 eec5b624e261c0632dc1ad11f2dfcc21bfffb94f cb88db99c454c000ba02b4bbb46c241d7042a1df 56d5bcef4cc37811d87d84fa7c4aae4f1c5b3671 1ac29c5a39794d376375689072816fefe8d9d111 0adcf0d331da7f8d6908e0693b6cfba93e81f005 0e2017ff497df4b972dd32c942f2e4f693fe9137 3c81ff8dccad070115a18fafa9e76f7df9542022 31a1e4cc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:a4:e9:38:db:bf:f4:84:01:b1:bc:08:19:09:f9:c9:c4:5d:89:0d] modulus: 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 public exponent: 10001 ] 2021-09-07 08:40:13.210  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-07 08:40:13.211 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-07 08:40:13.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-07 08:40:13.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-07 08:40:13.214  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-07 08:40:13.214  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-07 08:40:13.215  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-07 08:40:13.215  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-07 08:40:13.216  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-07 08:40:13.220  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-07 08:40:13.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:40:13.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:40:13.222  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-07 08:40:13.310  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-07 08:40:13.311  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-07 08:40:13.311 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-07 08:40:13.312 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-07 08:40:13.313  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1526 2021-09-07 08:40:13.314  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-07 08:40:13.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-07 08:40:13.315  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-07 08:40:13.316  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-07 08:40:13.316  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-07 08:40:13.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:40:13.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:40:13.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:40:13.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:40:13.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:40:13.318 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:40:13.319 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-07 08:40:13.321 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 326909869566544485714467184620060145468562201857 IssuerDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 07 06:21:36 UTC 2021 Final Date: Sun Sep 07 06:21:35 UTC 2031 SubjectDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:91:62:fc:3a:16:68:45:66:fd:29:a3:d8:4d:36:5d:b4:6a:d0:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d7c736b09b7d7cbcaa9e7349a18af11053f69d56 bdacf5d296b7a1ed1163532cf6baabab021d6e50 03a177f91363e543160f229f3b33a08064a1e040 f6b038aa38e1fc936bf5185539e4a250c986d11e b096bae98845a044435ad08fada8bba20e5f7cb9 d6df4fc27e64da412bdac2c1b4896bb06601581e 61f8f622272d6922db9d981a9c1705b9b550ef37 9a3a24b16a351001b0b6710a87749f3ea0f58655 cfd7d43e85deaea86071f7f13b0ed3cf73846984 1cb9f5c38fe756f4e6a462b27c9540480077183c 6ab6af9444ecb9c95bae4496e9b9948a2e1b6613 9df1489452aefa95ead723c0c40758ffe0fc4e60 eec5b624e261c0632dc1ad11f2dfcc21bfffb94f cb88db99c454c000ba02b4bbb46c241d7042a1df 56d5bcef4cc37811d87d84fa7c4aae4f1c5b3671 1ac29c5a39794d376375689072816fefe8d9d111 0adcf0d331da7f8d6908e0693b6cfba93e81f005 0e2017ff497df4b972dd32c942f2e4f693fe9137 3c81ff8dccad070115a18fafa9e76f7df9542022 31a1e4cc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:9d:45:07:67:28:13:3b:ef:b8:8e:f6:d3:a1:a4:04:57:10:ba:bb] modulus: a15b94c55256174c47bcf95e9421f369c0b52233249ec035b87c02c8bf947f811c24202ebea767e4324ff1691949e0afeb233803a2744cbdf5a98fee79dd86178f3474f3f49e75eef77d9e7cfee43a50dfeee642954f49c45f7751a44364be348b79bf615136af751820b6eb059f3c8dfe2bd4bf058de69d8b92aec35f8b7466823e374a563956c6e49e0ed8ea11ed56af8cde1a9dbd3613ac40bbf378c1799dee52b018f1a5c6452c41b06c404f979c81df9d05eafa045778ae1c2a61c8ccd7528e73b00719e77ee2c747e8f935d82421d1de13db8c3c5e0df56a6e2c42dd928271b31966d6afa51f95e4ee845885482c732c3378c7a2dea030a58e57bdd055 public exponent: 10001 ] 2021-09-07 08:40:52.037  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-07 08:40:52.039 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-07 08:40:52.042 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-07 08:40:52.043 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-07 08:40:52.043  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-07 08:40:52.044  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-07 08:40:52.044  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-07 08:40:52.045  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-07 08:40:52.046  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-07 08:40:52.053  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-07 08:40:52.054  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:40:52.055  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:40:52.056  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-07 08:40:52.208  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-07 08:40:52.209  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-07 08:40:52.209 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-07 08:40:52.211 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-07 08:40:52.212  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1526 2021-09-07 08:40:52.212  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-07 08:40:52.214  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-07 08:40:52.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-07 08:40:52.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-07 08:40:52.216  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-07 08:40:52.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:40:52.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:40:52.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:40:52.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:40:52.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:40:52.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:40:52.219 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-07 08:40:52.223 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 326909869566544485714467184620060145468562201857 IssuerDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 07 06:21:36 UTC 2021 Final Date: Sun Sep 07 06:21:35 UTC 2031 SubjectDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:91:62:fc:3a:16:68:45:66:fd:29:a3:d8:4d:36:5d:b4:6a:d0:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d7c736b09b7d7cbcaa9e7349a18af11053f69d56 bdacf5d296b7a1ed1163532cf6baabab021d6e50 03a177f91363e543160f229f3b33a08064a1e040 f6b038aa38e1fc936bf5185539e4a250c986d11e b096bae98845a044435ad08fada8bba20e5f7cb9 d6df4fc27e64da412bdac2c1b4896bb06601581e 61f8f622272d6922db9d981a9c1705b9b550ef37 9a3a24b16a351001b0b6710a87749f3ea0f58655 cfd7d43e85deaea86071f7f13b0ed3cf73846984 1cb9f5c38fe756f4e6a462b27c9540480077183c 6ab6af9444ecb9c95bae4496e9b9948a2e1b6613 9df1489452aefa95ead723c0c40758ffe0fc4e60 eec5b624e261c0632dc1ad11f2dfcc21bfffb94f cb88db99c454c000ba02b4bbb46c241d7042a1df 56d5bcef4cc37811d87d84fa7c4aae4f1c5b3671 1ac29c5a39794d376375689072816fefe8d9d111 0adcf0d331da7f8d6908e0693b6cfba93e81f005 0e2017ff497df4b972dd32c942f2e4f693fe9137 3c81ff8dccad070115a18fafa9e76f7df9542022 31a1e4cc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0b:8e:7b:87:7b:ab:2a:f9:e0:a1:48:8c:52:20:d9:bf:ac:c4:86:fd] modulus: f9a7466234d509e45695f11430e41441dccb7aee8cf62dc689e213d5eff1b7df377af39d2388c0b08c328b3cb2013cb6fce579b82a98dc59569dcb98d7c2e7de7ce68da91114e824529a1bc2476ca0cdb889595cc4661cd8b2fcf4ddeb2fc6558e4abfde853ee7ca7ab1ab51cbda0053960f7693519ae769138725baa9c48f1f913af3ba6ce119580ae1bee7e4cec0962c28a407abc3bb68b2df0ab680e335c03e545cf04a826caa2644887ceedaad3dab4369e24ad744e3058ed3554cbaa373c4e71e7a218651c457aa392859c88021531fc911a5293a2bc43d72649fd73e303bd3d01ec50ee7bbaccdc8dfdb55f66a91c70dd514ccac4f2b6dfcc7b0828039 public exponent: 10001 ] 2021-09-07 08:42:02.823  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-07 08:42:02.826 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-07 08:42:02.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-07 08:42:02.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-07 08:42:02.830  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-07 08:42:02.830  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-07 08:42:02.831  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-07 08:42:02.831  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-07 08:42:02.832  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-07 08:42:02.837  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-07 08:42:02.838  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:42:02.839  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-07 08:42:02.840  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-07 08:42:02.980  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-07 08:42:02.981  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-07 08:42:02.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-07 08:42:02.983 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-07 08:42:02.984  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1526 2021-09-07 08:42:02.984  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-07 08:42:02.986  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-07 08:42:02.986  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-07 08:42:02.987  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-07 08:42:02.987  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-07 08:42:02.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:42:02.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:42:02.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:42:02.989 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-07 08:42:02.990 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-07 08:42:02.990 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-07 08:42:02.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-07 08:42:02.994 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 326909869566544485714467184620060145468562201857 IssuerDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Sep 07 06:21:36 UTC 2021 Final Date: Sun Sep 07 06:21:35 UTC 2031 SubjectDN: UID=c-05u1c6ezrzrjmmlwl,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [97:91:62:fc:3a:16:68:45:66:fd:29:a3:d8:4d:36:5d:b4:6a:d0:0f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d7c736b09b7d7cbcaa9e7349a18af11053f69d56 bdacf5d296b7a1ed1163532cf6baabab021d6e50 03a177f91363e543160f229f3b33a08064a1e040 f6b038aa38e1fc936bf5185539e4a250c986d11e b096bae98845a044435ad08fada8bba20e5f7cb9 d6df4fc27e64da412bdac2c1b4896bb06601581e 61f8f622272d6922db9d981a9c1705b9b550ef37 9a3a24b16a351001b0b6710a87749f3ea0f58655 cfd7d43e85deaea86071f7f13b0ed3cf73846984 1cb9f5c38fe756f4e6a462b27c9540480077183c 6ab6af9444ecb9c95bae4496e9b9948a2e1b6613 9df1489452aefa95ead723c0c40758ffe0fc4e60 eec5b624e261c0632dc1ad11f2dfcc21bfffb94f cb88db99c454c000ba02b4bbb46c241d7042a1df 56d5bcef4cc37811d87d84fa7c4aae4f1c5b3671 1ac29c5a39794d376375689072816fefe8d9d111 0adcf0d331da7f8d6908e0693b6cfba93e81f005 0e2017ff497df4b972dd32c942f2e4f693fe9137 3c81ff8dccad070115a18fafa9e76f7df9542022 31a1e4cc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:5a:0b:40:4e:b3:e3:62:09:ac:1a:f2:84:8f:c5:e9:a7:eb:d9:aa] modulus: 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 public exponent: 10001 ]