2021-07-27 10:29:14,394 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-07-27 10:29:15,196 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-07-27 10:29:15.814  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-07-27 10:29:18.593 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-07-27 10:29:18.807  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-07-27 10:29:18.983  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-07-27 10:29:21.303  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.605 seconds (JVM running for 9.192) 2021-07-27 10:30:16.559  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-27 10:30:16.571 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-27 10:30:16.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-07-27 10:30:16.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-27 10:30:16.653  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-07-27 10:30:16.657  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-27 10:30:16.662  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-27 10:30:16.663  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 10:30:16.663  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-27 10:30:16.672  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-27 10:30:16.676  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-27 10:30:16.723  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-27 10:30:16.729  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 10:30:16.730  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 10:30:16.745  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-27 10:30:17.372  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-27 10:30:17.377  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-27 10:30:17.378 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-27 10:30:17.386 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-27 10:30:17.388  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1542 2021-07-27 10:30:17.389  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-27 10:30:17.395  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-27 10:30:17.396  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-27 10:30:17.404  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-27 10:30:17.405  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-27 10:30:17.406 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 10:30:17.407 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 10:30:17.407 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 10:30:17.423 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 10:30:17.424 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 10:30:17.424 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 10:30:17.435 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-27 10:30:17.470 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200506985917852767934012960443398751291118328476 IssuerDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 27 10:25:43 UTC 2021 Final Date: Sun Jul 27 10:25:42 UTC 2031 SubjectDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:dd:d4:23:16:97:34:78:56:8d:10:e9:74:71:b9:0f:c5:46:1f:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 95f6e5e3f2f0316be8d7d61f0a7e0086739a79ca d9da5213498b7b9d80a9e8e253af77ab6cef8df6 ee0b427536e880642da23a9c9a296441368eff3c 541e87df726457d471eb07553a2570ddc28d3999 728bed27e02347059ac6812a7da8ef8d598b947d e98cb6181790f9da1f2ae4e3dc4adab9eeff2ec5 e2963807ce7583ce4167e6ef0246632ce51dc7cb fc7551bfc20a73ca157a50258327e759880db189 15c7d8ebe970368e9ba32025734fc02496520f18 fa80893aee3d689dd05124ad4c965e29576bd1fe 813f97edfd7c398498ca0462c58ee633a1ba8cf3 59e4490b07eb923d4174b3dfe85a5915d098d28f 6912d8106dcf96708983fb2a01c46859a4d45670 913b47e7791d2f5212f2998f237f078f525e3ae4 cc975151a71b875faab40e823da0960ddea742f7 8b115708bdb718023ba3d9b4f4b4f6042f529df3 e896c804fd3fb260c3d45da77bf36a0e3c2f61ab c0362f28d5abe9d1bffd5da2bc99315785de1b70 c6a9dbc74fe15bc06fc7f3c159244662b8887d70 bb12299f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:34:31:37:89:f0:e2:43:42:78:ae:27:33:8f:94:17:09:2f:b6:82] modulus: d30acb0be064dd9095d3483e9f36a6e92e4f364918070ae4eeefa0933f719b7278f0d6e19579272ff84b8f5ecefd903ed2aefb62492df8fc36381f1b132a90807d4c197abee18685db0fc7c6c87788038398bf60e60736a4b14fac5b3d0e5b818ed8525210ea34ba60ca8fb0c45b8ba08908c8bdc3c82afc164408dde83783b71d245f9de159a7d4f23289e1c5e2c08c11d1af432ba075b31d59624cb20fccec04e116cb75bee9053d6a399c47705f4ee9f85e94fd367b47e7f487be2ba8f92a74a59ceb0d0bc2eb05d8ce0aca985c596b8fc9aba66f5c1ff5a7cdf8946219182627e6659d750dcbfcde42bcb2503a1742fd3c59b001827f0c627cef2699fc6f public exponent: 10001 ] 2021-07-27 11:03:21.350  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-27 11:03:21.366 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-27 11:03:21.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-07-27 11:03:21.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-27 11:03:21.378  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-07-27 11:03:21.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-27 11:03:21.381  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-27 11:03:21.383  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-27 11:03:21.385  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-27 11:03:21.394  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-27 11:03:21.396  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:03:21.397  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:03:21.400  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-27 11:03:21.591  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-27 11:03:21.592  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-27 11:03:21.593 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-27 11:03:21.598 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-27 11:03:21.600  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1542 2021-07-27 11:03:21.600  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-27 11:03:21.604  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-27 11:03:21.605  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-27 11:03:21.606  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-27 11:03:21.607  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-27 11:03:21.608 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:03:21.608 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:03:21.609 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:03:21.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:03:21.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:03:21.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:03:21.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-27 11:03:21.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200506985917852767934012960443398751291118328476 IssuerDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 27 10:25:43 UTC 2021 Final Date: Sun Jul 27 10:25:42 UTC 2031 SubjectDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:dd:d4:23:16:97:34:78:56:8d:10:e9:74:71:b9:0f:c5:46:1f:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 95f6e5e3f2f0316be8d7d61f0a7e0086739a79ca d9da5213498b7b9d80a9e8e253af77ab6cef8df6 ee0b427536e880642da23a9c9a296441368eff3c 541e87df726457d471eb07553a2570ddc28d3999 728bed27e02347059ac6812a7da8ef8d598b947d e98cb6181790f9da1f2ae4e3dc4adab9eeff2ec5 e2963807ce7583ce4167e6ef0246632ce51dc7cb fc7551bfc20a73ca157a50258327e759880db189 15c7d8ebe970368e9ba32025734fc02496520f18 fa80893aee3d689dd05124ad4c965e29576bd1fe 813f97edfd7c398498ca0462c58ee633a1ba8cf3 59e4490b07eb923d4174b3dfe85a5915d098d28f 6912d8106dcf96708983fb2a01c46859a4d45670 913b47e7791d2f5212f2998f237f078f525e3ae4 cc975151a71b875faab40e823da0960ddea742f7 8b115708bdb718023ba3d9b4f4b4f6042f529df3 e896c804fd3fb260c3d45da77bf36a0e3c2f61ab c0362f28d5abe9d1bffd5da2bc99315785de1b70 c6a9dbc74fe15bc06fc7f3c159244662b8887d70 bb12299f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:0e:c2:a1:ce:20:1b:e5:8d:08:01:07:2b:b8:3b:d7:2c:8c:49:fa] modulus: bc4b1e28bdb8270858870dd708e4ce0b6c378c609c414ac9aef055449663829acbddf009a8841eda6e95cb7f4ff690204db54a4573d0090485c0b9599c64f49337625c855054add16c4e799cb390b34b6ce28c781bdc1cff4429fb6a020beea0a0c560d9a3d3dcf3e095f5c71de0c15ac13f06d592db27d7bd2e7334569c19ac380a589face82d706d40b565ca5fadba3db385dc458987266d8a6e222dff9b05031aa8d6627bfe735f7e88c3ba8b3ca6fcd07ad5ac14e0676f163dbcbd6984c971044ec6193f4700479c9ea17e85368e260585d4ec7177f5b701713f4c84da19dc465134149cc2c47cc1b2e8fce91c1edc84b23dde7e9885580ae755b3861817 public exponent: 10001 ] 2021-07-27 11:07:55.803  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-27 11:07:55.808 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-27 11:07:55.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-27 11:07:55.813 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-27 11:07:55.814  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-27 11:07:55.815  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-27 11:07:55.815  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-27 11:07:55.816  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-27 11:07:55.817  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-27 11:07:55.833  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-27 11:07:55.834  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:07:55.835  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:07:55.838  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-27 11:07:56.007  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-27 11:07:56.007  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-27 11:07:56.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-27 11:07:56.021 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-27 11:07:56.023  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1542 2021-07-27 11:07:56.023  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-27 11:07:56.025  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-27 11:07:56.026  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-27 11:07:56.027  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-27 11:07:56.028  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-27 11:07:56.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:07:56.029 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:07:56.030 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:07:56.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:07:56.032 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:07:56.032 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:07:56.034 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-27 11:07:56.038 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200506985917852767934012960443398751291118328476 IssuerDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 27 10:25:43 UTC 2021 Final Date: Sun Jul 27 10:25:42 UTC 2031 SubjectDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:dd:d4:23:16:97:34:78:56:8d:10:e9:74:71:b9:0f:c5:46:1f:72] modulus: e3049df6a3cef8b55088f751d9f01d883b9b4364529e6237fd11d4f2a3097b860df20eb3582ba29f94c3877b8b7a7e92fbc3e79c1b686bf5ad9c568ce2ad9b9606de428d8e3d54ad3d489e629cbb9bf599269799e5f6bad2d75fb7e71f2bfc53a7020b0c86fad8c061f6e03e6f00eccc66717d13126c450d963a2f6a650275392a8a2913a4c0c00ca546ab1d7323ef67957c620ae7d0656b9bac46be3efce646b0bf2fde2d7484bf17005e0850e1b0415c916abd5408f36b2c8548803cfff0bd16784ad0a547a4c3635249058652171c2c17cd20313fca8bc31345637dd2bf51f4401799ce8e5c07e72e1dc6221d17a5d95d18e4dd077604fe2e349dda5851c703f59b9545eb5d0d56ba590efbdd18ae13f8fea1029cb1c4a073895f731f146211c2582eb31e6e263d5baed6b1d8405827068c7edd180f5d7c4f53203503fff76a7950683f13033a2ceb6aca64063f1dc329ebdb6f755c02022bcede86e70e6deedea0b848e60eb40cd87147d654534ff2848fc32d36cc4e99ea23719c78cd5d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 95f6e5e3f2f0316be8d7d61f0a7e0086739a79ca d9da5213498b7b9d80a9e8e253af77ab6cef8df6 ee0b427536e880642da23a9c9a296441368eff3c 541e87df726457d471eb07553a2570ddc28d3999 728bed27e02347059ac6812a7da8ef8d598b947d e98cb6181790f9da1f2ae4e3dc4adab9eeff2ec5 e2963807ce7583ce4167e6ef0246632ce51dc7cb fc7551bfc20a73ca157a50258327e759880db189 15c7d8ebe970368e9ba32025734fc02496520f18 fa80893aee3d689dd05124ad4c965e29576bd1fe 813f97edfd7c398498ca0462c58ee633a1ba8cf3 59e4490b07eb923d4174b3dfe85a5915d098d28f 6912d8106dcf96708983fb2a01c46859a4d45670 913b47e7791d2f5212f2998f237f078f525e3ae4 cc975151a71b875faab40e823da0960ddea742f7 8b115708bdb718023ba3d9b4f4b4f6042f529df3 e896c804fd3fb260c3d45da77bf36a0e3c2f61ab c0362f28d5abe9d1bffd5da2bc99315785de1b70 c6a9dbc74fe15bc06fc7f3c159244662b8887d70 bb12299f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [57:fe:5c:b4:78:b3:2f:23:de:03:ab:28:89:3b:da:92:91:f3:e8:ba] modulus: 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 public exponent: 10001 ] 2021-07-27 11:09:27.090  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-27 11:09:27.094 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-27 11:09:27.099 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-27 11:09:27.100 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-27 11:09:27.101  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-27 11:09:27.107  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-27 11:09:27.108  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-27 11:09:27.110  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-27 11:09:27.110  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-27 11:09:27.118  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-27 11:09:27.119  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:09:27.120  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:09:27.122  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-27 11:09:27.337  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-27 11:09:27.338  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-27 11:09:27.339 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-27 11:09:27.340 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-27 11:09:27.341  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1542 2021-07-27 11:09:27.342  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-27 11:09:27.343  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-27 11:09:27.344  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-27 11:09:27.345  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-27 11:09:27.345  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-27 11:09:27.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:09:27.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:09:27.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:09:27.348 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:09:27.348 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:09:27.349 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:09:27.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-27 11:09:27.354 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200506985917852767934012960443398751291118328476 IssuerDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 27 10:25:43 UTC 2021 Final Date: Sun Jul 27 10:25:42 UTC 2031 SubjectDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:dd:d4:23:16:97:34:78:56:8d:10:e9:74:71:b9:0f:c5:46:1f:72] modulus: e3049df6a3cef8b55088f751d9f01d883b9b4364529e6237fd11d4f2a3097b860df20eb3582ba29f94c3877b8b7a7e92fbc3e79c1b686bf5ad9c568ce2ad9b9606de428d8e3d54ad3d489e629cbb9bf599269799e5f6bad2d75fb7e71f2bfc53a7020b0c86fad8c061f6e03e6f00eccc66717d13126c450d963a2f6a650275392a8a2913a4c0c00ca546ab1d7323ef67957c620ae7d0656b9bac46be3efce646b0bf2fde2d7484bf17005e0850e1b0415c916abd5408f36b2c8548803cfff0bd16784ad0a547a4c3635249058652171c2c17cd20313fca8bc31345637dd2bf51f4401799ce8e5c07e72e1dc6221d17a5d95d18e4dd077604fe2e349dda5851c703f59b9545eb5d0d56ba590efbdd18ae13f8fea1029cb1c4a073895f731f146211c2582eb31e6e263d5baed6b1d8405827068c7edd180f5d7c4f53203503fff76a7950683f13033a2ceb6aca64063f1dc329ebdb6f755c02022bcede86e70e6deedea0b848e60eb40cd87147d654534ff2848fc32d36cc4e99ea23719c78cd5d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 95f6e5e3f2f0316be8d7d61f0a7e0086739a79ca d9da5213498b7b9d80a9e8e253af77ab6cef8df6 ee0b427536e880642da23a9c9a296441368eff3c 541e87df726457d471eb07553a2570ddc28d3999 728bed27e02347059ac6812a7da8ef8d598b947d e98cb6181790f9da1f2ae4e3dc4adab9eeff2ec5 e2963807ce7583ce4167e6ef0246632ce51dc7cb fc7551bfc20a73ca157a50258327e759880db189 15c7d8ebe970368e9ba32025734fc02496520f18 fa80893aee3d689dd05124ad4c965e29576bd1fe 813f97edfd7c398498ca0462c58ee633a1ba8cf3 59e4490b07eb923d4174b3dfe85a5915d098d28f 6912d8106dcf96708983fb2a01c46859a4d45670 913b47e7791d2f5212f2998f237f078f525e3ae4 cc975151a71b875faab40e823da0960ddea742f7 8b115708bdb718023ba3d9b4f4b4f6042f529df3 e896c804fd3fb260c3d45da77bf36a0e3c2f61ab c0362f28d5abe9d1bffd5da2bc99315785de1b70 c6a9dbc74fe15bc06fc7f3c159244662b8887d70 bb12299f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:c8:bf:bb:8b:98:1e:ee:71:26:46:a7:1d:d2:f1:87:e4:01:e2:70] modulus: 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 public exponent: 10001 ] 2021-07-27 11:20:03.593  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-27 11:20:03.598 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-27 11:20:03.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-07-27 11:20:03.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-27 11:20:03.604  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-07-27 11:20:03.606  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-27 11:20:03.607  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-27 11:20:03.607  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-27 11:20:03.608  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-27 11:20:03.616  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-27 11:20:03.618  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:20:03.618  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:20:03.620  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-27 11:20:03.789  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-27 11:20:03.790  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-27 11:20:03.790 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-27 11:20:03.792 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-27 11:20:03.793  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1542 2021-07-27 11:20:03.793  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-27 11:20:03.795  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-27 11:20:03.796  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-27 11:20:03.797  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-27 11:20:03.798  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-27 11:20:03.799 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:20:03.799 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:20:03.800 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:20:03.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:20:03.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:20:03.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:20:03.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-27 11:20:03.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200506985917852767934012960443398751291118328476 IssuerDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 27 10:25:43 UTC 2021 Final Date: Sun Jul 27 10:25:42 UTC 2031 SubjectDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:dd:d4:23:16:97:34:78:56:8d:10:e9:74:71:b9:0f:c5:46:1f:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 95f6e5e3f2f0316be8d7d61f0a7e0086739a79ca d9da5213498b7b9d80a9e8e253af77ab6cef8df6 ee0b427536e880642da23a9c9a296441368eff3c 541e87df726457d471eb07553a2570ddc28d3999 728bed27e02347059ac6812a7da8ef8d598b947d e98cb6181790f9da1f2ae4e3dc4adab9eeff2ec5 e2963807ce7583ce4167e6ef0246632ce51dc7cb fc7551bfc20a73ca157a50258327e759880db189 15c7d8ebe970368e9ba32025734fc02496520f18 fa80893aee3d689dd05124ad4c965e29576bd1fe 813f97edfd7c398498ca0462c58ee633a1ba8cf3 59e4490b07eb923d4174b3dfe85a5915d098d28f 6912d8106dcf96708983fb2a01c46859a4d45670 913b47e7791d2f5212f2998f237f078f525e3ae4 cc975151a71b875faab40e823da0960ddea742f7 8b115708bdb718023ba3d9b4f4b4f6042f529df3 e896c804fd3fb260c3d45da77bf36a0e3c2f61ab c0362f28d5abe9d1bffd5da2bc99315785de1b70 c6a9dbc74fe15bc06fc7f3c159244662b8887d70 bb12299f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:5e:67:3b:13:00:69:6e:86:ab:41:66:ab:be:47:3c:80:c3:66:6f] modulus: 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 public exponent: 10001 ] 2021-07-27 11:21:17.740  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-27 11:21:17.744 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-27 11:21:17.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-27 11:21:17.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-27 11:21:17.750  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-27 11:21:17.751  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-27 11:21:17.752  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-27 11:21:17.753  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-27 11:21:17.754  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-27 11:21:17.762  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-27 11:21:17.764  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:21:17.764  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:21:17.766  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-27 11:21:17.916  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-27 11:21:17.917  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-27 11:21:17.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-27 11:21:17.921 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-27 11:21:17.922  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1542 2021-07-27 11:21:17.923  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-27 11:21:17.924  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-27 11:21:17.925  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-27 11:21:17.926  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-27 11:21:17.926  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-27 11:21:17.927 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:21:17.927 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:21:17.928 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:21:17.929 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:21:17.930 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:21:17.930 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:21:17.932 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-27 11:21:17.937 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200506985917852767934012960443398751291118328476 IssuerDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 27 10:25:43 UTC 2021 Final Date: Sun Jul 27 10:25:42 UTC 2031 SubjectDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:dd:d4:23:16:97:34:78:56:8d:10:e9:74:71:b9:0f:c5:46:1f:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 95f6e5e3f2f0316be8d7d61f0a7e0086739a79ca d9da5213498b7b9d80a9e8e253af77ab6cef8df6 ee0b427536e880642da23a9c9a296441368eff3c 541e87df726457d471eb07553a2570ddc28d3999 728bed27e02347059ac6812a7da8ef8d598b947d e98cb6181790f9da1f2ae4e3dc4adab9eeff2ec5 e2963807ce7583ce4167e6ef0246632ce51dc7cb fc7551bfc20a73ca157a50258327e759880db189 15c7d8ebe970368e9ba32025734fc02496520f18 fa80893aee3d689dd05124ad4c965e29576bd1fe 813f97edfd7c398498ca0462c58ee633a1ba8cf3 59e4490b07eb923d4174b3dfe85a5915d098d28f 6912d8106dcf96708983fb2a01c46859a4d45670 913b47e7791d2f5212f2998f237f078f525e3ae4 cc975151a71b875faab40e823da0960ddea742f7 8b115708bdb718023ba3d9b4f4b4f6042f529df3 e896c804fd3fb260c3d45da77bf36a0e3c2f61ab c0362f28d5abe9d1bffd5da2bc99315785de1b70 c6a9dbc74fe15bc06fc7f3c159244662b8887d70 bb12299f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [16:27:5a:f1:c4:9e:39:2b:49:a5:44:42:fe:7d:e0:e8:0f:fc:e7:56] modulus: dcd7a3b01b2f4c5772e41825e6654da23e723f6f6b16ac61c00b0f0f6c5905b79c41a236d06955eb04502701e6d1973ae4b8a0431f88680181773acc713bae7934072aac861cc93a8d07a1e5d1eab14e6c32978621a87e53839f1c0854e733d21259727fc8df697e1105be1296e02ef277c66bcae1329c36f186f5991df0919927cd86a4fec1031eb12bd5fac627e5ccff67121cdcfa785e55a008f8b66cd9ac6ea5c12ca5f945a9082051033f61afed2277c5799aa0e2cd94deeb2b4d2da73c0639573418c2d606a00428360bbe14d2b203819ffb7d52a15f48dbf8bfc956dc0a62953fb662f2998d87ce9f3f3e79f97d6a662626d32569e769b77e77d54005 public exponent: 10001 ] 2021-07-27 11:22:30.704  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-27 11:22:30.708 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-27 11:22:30.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-27 11:22:30.712 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-27 11:22:30.712  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-27 11:22:30.713  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-27 11:22:30.714  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-27 11:22:30.714  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-27 11:22:30.715  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-27 11:22:30.721  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-27 11:22:30.722  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:22:30.722  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:22:30.724  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-27 11:22:30.883  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-27 11:22:30.884  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-27 11:22:30.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-27 11:22:30.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-27 11:22:30.889  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1542 2021-07-27 11:22:30.889  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-27 11:22:30.892  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-27 11:22:30.892  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-27 11:22:30.893  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-27 11:22:30.894  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-27 11:22:30.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:22:30.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:22:30.896 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:22:30.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:22:30.898 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:22:30.898 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:22:30.900 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-27 11:22:30.905 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200506985917852767934012960443398751291118328476 IssuerDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 27 10:25:43 UTC 2021 Final Date: Sun Jul 27 10:25:42 UTC 2031 SubjectDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:dd:d4:23:16:97:34:78:56:8d:10:e9:74:71:b9:0f:c5:46:1f:72] modulus: e3049df6a3cef8b55088f751d9f01d883b9b4364529e6237fd11d4f2a3097b860df20eb3582ba29f94c3877b8b7a7e92fbc3e79c1b686bf5ad9c568ce2ad9b9606de428d8e3d54ad3d489e629cbb9bf599269799e5f6bad2d75fb7e71f2bfc53a7020b0c86fad8c061f6e03e6f00eccc66717d13126c450d963a2f6a650275392a8a2913a4c0c00ca546ab1d7323ef67957c620ae7d0656b9bac46be3efce646b0bf2fde2d7484bf17005e0850e1b0415c916abd5408f36b2c8548803cfff0bd16784ad0a547a4c3635249058652171c2c17cd20313fca8bc31345637dd2bf51f4401799ce8e5c07e72e1dc6221d17a5d95d18e4dd077604fe2e349dda5851c703f59b9545eb5d0d56ba590efbdd18ae13f8fea1029cb1c4a073895f731f146211c2582eb31e6e263d5baed6b1d8405827068c7edd180f5d7c4f53203503fff76a7950683f13033a2ceb6aca64063f1dc329ebdb6f755c02022bcede86e70e6deedea0b848e60eb40cd87147d654534ff2848fc32d36cc4e99ea23719c78cd5d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 95f6e5e3f2f0316be8d7d61f0a7e0086739a79ca d9da5213498b7b9d80a9e8e253af77ab6cef8df6 ee0b427536e880642da23a9c9a296441368eff3c 541e87df726457d471eb07553a2570ddc28d3999 728bed27e02347059ac6812a7da8ef8d598b947d e98cb6181790f9da1f2ae4e3dc4adab9eeff2ec5 e2963807ce7583ce4167e6ef0246632ce51dc7cb fc7551bfc20a73ca157a50258327e759880db189 15c7d8ebe970368e9ba32025734fc02496520f18 fa80893aee3d689dd05124ad4c965e29576bd1fe 813f97edfd7c398498ca0462c58ee633a1ba8cf3 59e4490b07eb923d4174b3dfe85a5915d098d28f 6912d8106dcf96708983fb2a01c46859a4d45670 913b47e7791d2f5212f2998f237f078f525e3ae4 cc975151a71b875faab40e823da0960ddea742f7 8b115708bdb718023ba3d9b4f4b4f6042f529df3 e896c804fd3fb260c3d45da77bf36a0e3c2f61ab c0362f28d5abe9d1bffd5da2bc99315785de1b70 c6a9dbc74fe15bc06fc7f3c159244662b8887d70 bb12299f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:41:de:b5:f5:3a:56:1d:70:ae:10:c7:ea:5a:4c:35:df:19:7e:01] modulus: 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 public exponent: 10001 ] 2021-07-27 11:37:08.220  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-27 11:37:08.224 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-27 11:37:08.227 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-dev }, SANs: [ves-dev] } 2021-07-27 11:37:08.228 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-27 11:37:08.229  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-dev }, SANs: [ves-dev] } 2021-07-27 11:37:08.230  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-27 11:37:08.230  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-27 11:37:08.231  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-27 11:37:08.232  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-27 11:37:08.238  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-27 11:37:08.239  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:37:08.240  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-27 11:37:08.242  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-27 11:37:08.391  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-27 11:37:08.392  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-27 11:37:08.393 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-27 11:37:08.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-27 11:37:08.395  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1542 2021-07-27 11:37:08.396  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-27 11:37:08.399  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-27 11:37:08.400  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-27 11:37:08.401  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-27 11:37:08.401  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-27 11:37:08.402 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:37:08.402 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:37:08.403 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:37:08.404 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-27 11:37:08.404 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-27 11:37:08.405 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-27 11:37:08.406 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-dev,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-27 11:37:08.410 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 200506985917852767934012960443398751291118328476 IssuerDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 27 10:25:43 UTC 2021 Final Date: Sun Jul 27 10:25:42 UTC 2031 SubjectDN: UID=c-034ip3yvamp5plsje,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [98:dd:d4:23:16:97:34:78:56:8d:10:e9:74:71:b9:0f:c5:46:1f:72] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 95f6e5e3f2f0316be8d7d61f0a7e0086739a79ca d9da5213498b7b9d80a9e8e253af77ab6cef8df6 ee0b427536e880642da23a9c9a296441368eff3c 541e87df726457d471eb07553a2570ddc28d3999 728bed27e02347059ac6812a7da8ef8d598b947d e98cb6181790f9da1f2ae4e3dc4adab9eeff2ec5 e2963807ce7583ce4167e6ef0246632ce51dc7cb fc7551bfc20a73ca157a50258327e759880db189 15c7d8ebe970368e9ba32025734fc02496520f18 fa80893aee3d689dd05124ad4c965e29576bd1fe 813f97edfd7c398498ca0462c58ee633a1ba8cf3 59e4490b07eb923d4174b3dfe85a5915d098d28f 6912d8106dcf96708983fb2a01c46859a4d45670 913b47e7791d2f5212f2998f237f078f525e3ae4 cc975151a71b875faab40e823da0960ddea742f7 8b115708bdb718023ba3d9b4f4b4f6042f529df3 e896c804fd3fb260c3d45da77bf36a0e3c2f61ab c0362f28d5abe9d1bffd5da2bc99315785de1b70 c6a9dbc74fe15bc06fc7f3c159244662b8887d70 bb12299f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:36:cc:08:30:f0:7f:8d:f8:4e:ed:51:a9:8d:19:8b:d4:fd:2a:16] modulus: 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 public exponent: 10001 ]