2021-05-25 02:18:33,400 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-25 02:18:36,898 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-25 02:18:39.493  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-25 02:18:50.191 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-25 02:18:51.201  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-25 02:18:51.903  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-25 02:19:04.294  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 32.895 seconds (JVM running for 39.494) 2021-05-25 02:39:04.586  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-25 02:39:04.597 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-25 02:39:04.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org ,SANs: [] } 2021-05-25 02:39:04.798 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-25 02:39:04.985  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org ,SANs: [] } 2021-05-25 02:39:04.989  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-25 02:39:04.993  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-25 02:39:04.997  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-25 02:39:04.997  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-25 02:39:05.096  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-25 02:39:05.195  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-25 02:39:05.408  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-25 02:39:05.487  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-25 02:39:05.489  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-25 02:39:05.590  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-25 02:39:06.786  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-25 02:39:06.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-25 02:39:06.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-25 02:39:06.796  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1901 2021-05-25 02:39:06.796  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-25 02:39:06.801  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-25 02:39:06.802  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-25 02:39:06.808  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-25 02:39:06.808 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-25 02:39:06.885 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-25 02:39:06.886 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-25 02:39:06.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-25 02:39:06.901 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-25 02:39:06.901 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-25 02:39:06.988 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-25 02:39:07.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 620967435722786281960691056644559258278356443812 IssuerDN: UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 25 02:15:55 UTC 2021 Final Date: Sun May 25 02:15:55 UTC 2031 SubjectDN: UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:9f:a7:0e:a8:1d:b2:50:d3:2b:4c:52:6e:68:cf:4d:cd:da:ee:f8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86ecf8451b5ae4c5b4fc5943e12e0f4655c8beec 467b69631aef74716f3298c69d80f6fed44a4a80 609ff031eb631f0d427d22f5a188541304e280f8 60f9b81b543a5c39a19004e7f893099eb498b7e8 245f1604924bbb280e5b7e16b99659851d86473f 89f6ad92ca661be86185d8f994cf4ff2893448b6 9d615b524dfc80c2b4907eb374dffac9406aec14 0bbe9d0df1a307270ca9601dc5fb34db5a7d81ef e3a4a1ae44dd263b25c8d360f5877992bb5de9c6 b2255128fe363e00b7c3c49fa5f0e545ba1e41ab 79b557856bb539b23b2050254ce6d47576333915 9d51c2388bf287da7bd3626cf0619bc63ae66390 878c2a70a3580d68e6909200e6eff007e29426a7 55e6e4820a44719dbb8b908a821787011bfd3ae0 e76fee871f9fe308cfaea2047c9e142b4d82b74c 92d917209f7536ce507b4072ca78238cfa4134b1 f0820a1229326e8d07a0a8859f4f0f4b9290e278 01a970f7c827ea1b6cd2966b39e44190c5b2ed8c 9af020c02ea622a20be5f3c595cd9b574ca03728 fab99943 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:17:da:a2:68:80:ba:f7:ea:73:99:3d:1d:d7:67:41:ca:95:8a:7d] modulus: d8152fed9d3105c4f50831f3c7fc6bd214d39033d533c07d3f113c8a05679ab46a54a33ad1886c81375d60561f64d3b6f28310dc6f475cb94bea78f81789cf8a6562e2044f6b2a80a2020035949f15cfe76dc6f8148a6db282dd0526cd071d2dda490ef1326981b0b920f5b068eeca7d3944f2866b5fb4370effe9c03a34c851e79d1dbc967e8431b38985c0921f8d60469daac03dd537d0b0636562cb9d9db4942a898a58930ef5142d3f3747515880d825c36904435f4ede07b342227c971a001152e7ae18f357028797ca9c32fe81ce547477ec4055c55942ed0e75dad33dbeead8a6c7c1fdb7df2a269133f701fd97bfaf9a2312e7a224179f2984613b89 public exponent: 10001 ] 2021-05-25 03:30:47.724  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-25 03:30:47.726 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-25 03:30:47.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator ,SANs: [pnf-simulator] } 2021-05-25 03:30:47.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-25 03:30:47.730  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator ,SANs: [pnf-simulator] } 2021-05-25 03:30:47.731  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-25 03:30:47.732  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-25 03:30:47.732  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-25 03:30:47.733  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-25 03:30:47.785  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-25 03:30:47.786  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-25 03:30:47.787  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-25 03:30:47.789  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-25 03:30:47.922  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-25 03:30:47.923 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-25 03:30:47.926 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-25 03:30:47.926  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1901 2021-05-25 03:30:47.927  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-25 03:30:47.986  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-25 03:30:47.987  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-25 03:30:47.987  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-25 03:30:47.988 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-25 03:30:47.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-25 03:30:47.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-25 03:30:47.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-25 03:30:47.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-25 03:30:47.991 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-25 03:30:47.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-25 03:30:47.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 620967435722786281960691056644559258278356443812 IssuerDN: UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 25 02:15:55 UTC 2021 Final Date: Sun May 25 02:15:55 UTC 2031 SubjectDN: UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:9f:a7:0e:a8:1d:b2:50:d3:2b:4c:52:6e:68:cf:4d:cd:da:ee:f8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86ecf8451b5ae4c5b4fc5943e12e0f4655c8beec 467b69631aef74716f3298c69d80f6fed44a4a80 609ff031eb631f0d427d22f5a188541304e280f8 60f9b81b543a5c39a19004e7f893099eb498b7e8 245f1604924bbb280e5b7e16b99659851d86473f 89f6ad92ca661be86185d8f994cf4ff2893448b6 9d615b524dfc80c2b4907eb374dffac9406aec14 0bbe9d0df1a307270ca9601dc5fb34db5a7d81ef e3a4a1ae44dd263b25c8d360f5877992bb5de9c6 b2255128fe363e00b7c3c49fa5f0e545ba1e41ab 79b557856bb539b23b2050254ce6d47576333915 9d51c2388bf287da7bd3626cf0619bc63ae66390 878c2a70a3580d68e6909200e6eff007e29426a7 55e6e4820a44719dbb8b908a821787011bfd3ae0 e76fee871f9fe308cfaea2047c9e142b4d82b74c 92d917209f7536ce507b4072ca78238cfa4134b1 f0820a1229326e8d07a0a8859f4f0f4b9290e278 01a970f7c827ea1b6cd2966b39e44190c5b2ed8c 9af020c02ea622a20be5f3c595cd9b574ca03728 fab99943 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:13:be:49:c3:e3:b2:46:2f:98:f6:a7:3a:2f:09:01:3c:3e:ff:ab] modulus: 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 public exponent: 10001 ] 2021-05-25 03:34:31.562  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-25 03:34:31.563 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-25 03:34:31.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert ,SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-25 03:34:31.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-25 03:34:31.566  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert ,SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-25 03:34:31.567  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-25 03:34:31.567  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-25 03:34:31.568  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-25 03:34:31.568  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-25 03:34:31.590  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-25 03:34:31.591  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-25 03:34:31.591  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-25 03:34:31.593  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-25 03:34:31.753  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-25 03:34:31.754 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-25 03:34:31.756 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-25 03:34:31.756  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1901 2021-05-25 03:34:31.757  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-25 03:34:31.758  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-25 03:34:31.758  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-25 03:34:31.759  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-25 03:34:31.759 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-25 03:34:31.760 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-25 03:34:31.760 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-25 03:34:31.761 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-25 03:34:31.761 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-25 03:34:31.762 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-25 03:34:31.763 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-25 03:34:31.766 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 620967435722786281960691056644559258278356443812 IssuerDN: UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 25 02:15:55 UTC 2021 Final Date: Sun May 25 02:15:55 UTC 2031 SubjectDN: UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:9f:a7:0e:a8:1d:b2:50:d3:2b:4c:52:6e:68:cf:4d:cd:da:ee:f8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86ecf8451b5ae4c5b4fc5943e12e0f4655c8beec 467b69631aef74716f3298c69d80f6fed44a4a80 609ff031eb631f0d427d22f5a188541304e280f8 60f9b81b543a5c39a19004e7f893099eb498b7e8 245f1604924bbb280e5b7e16b99659851d86473f 89f6ad92ca661be86185d8f994cf4ff2893448b6 9d615b524dfc80c2b4907eb374dffac9406aec14 0bbe9d0df1a307270ca9601dc5fb34db5a7d81ef e3a4a1ae44dd263b25c8d360f5877992bb5de9c6 b2255128fe363e00b7c3c49fa5f0e545ba1e41ab 79b557856bb539b23b2050254ce6d47576333915 9d51c2388bf287da7bd3626cf0619bc63ae66390 878c2a70a3580d68e6909200e6eff007e29426a7 55e6e4820a44719dbb8b908a821787011bfd3ae0 e76fee871f9fe308cfaea2047c9e142b4d82b74c 92d917209f7536ce507b4072ca78238cfa4134b1 f0820a1229326e8d07a0a8859f4f0f4b9290e278 01a970f7c827ea1b6cd2966b39e44190c5b2ed8c 9af020c02ea622a20be5f3c595cd9b574ca03728 fab99943 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:aa:bf:ea:f9:aa:05:ef:b3:1d:eb:be:34:94:63:b5:e9:b8:c5:f9] modulus: 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 public exponent: 10001 ] 2021-05-25 03:36:54.101  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-25 03:36:54.102 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-25 03:36:54.103 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans ,SANs: [wrong-sans] } 2021-05-25 03:36:54.104 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-25 03:36:54.104  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans ,SANs: [wrong-sans] } 2021-05-25 03:36:54.105  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-25 03:36:54.105  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-25 03:36:54.106  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-25 03:36:54.106  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-25 03:36:54.111  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-25 03:36:54.111  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-25 03:36:54.112  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-25 03:36:54.113  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-25 03:36:54.279  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-25 03:36:54.280 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-25 03:36:54.285 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-25 03:36:54.286  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1901 2021-05-25 03:36:54.286  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-25 03:36:54.288  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-25 03:36:54.288  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-25 03:36:54.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-25 03:36:54.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-25 03:36:54.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-25 03:36:54.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-25 03:36:54.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-25 03:36:54.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-25 03:36:54.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-25 03:36:54.292 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-25 03:36:54.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 620967435722786281960691056644559258278356443812 IssuerDN: UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 25 02:15:55 UTC 2021 Final Date: Sun May 25 02:15:55 UTC 2031 SubjectDN: UID=c-04bf8127eb26d58be,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [58:9f:a7:0e:a8:1d:b2:50:d3:2b:4c:52:6e:68:cf:4d:cd:da:ee:f8] modulus: c0c564ad949122307fc13c548977aa2ea85ca44d3317b356218cc36917036fe4c31e1edddc1bebf187f656c981ff4fa4858ad7bdd41c706346b815cc94efd99c8b7525b941e391df1bc09dc9b34ab2d35e9499352615f2f0b10f5d7c10e60bca8ecf87470365fde0c3954ab286f0a0c97985033345534741bc469678c88b50f9291797cdf1123d53f71daf3b7f1e0d2aa3dded91c1e15133493bf83e9889f26d1c7fcdc56f14756a364e59c3fc13fc7115c77d68def1ecd156c0208625a442b90d8ae1cad664a5ee5f7de67242e52f4e56b43e0696214a6d70a6a29f8d42eb434b89244dc2153d74f61410f4e5818004ce1426d00efe7b777cf3fe73d3215f75b51879b9e1de8d133c82dc5b3b2c68a8614fd5cf430866fb10b2a1d6a3750c05af0f0ede735b33abd14622b3f754302b6649b898950eb1bb7daba745bec7070b611e4674ffb08f0eae4bd42cf8d04132785bdcfc204bf920fc69604299f7f97cf8cacb49fea74f18c5d1feb0b30effee872e7dd1060d44710be2dc6d4b457e41 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86ecf8451b5ae4c5b4fc5943e12e0f4655c8beec 467b69631aef74716f3298c69d80f6fed44a4a80 609ff031eb631f0d427d22f5a188541304e280f8 60f9b81b543a5c39a19004e7f893099eb498b7e8 245f1604924bbb280e5b7e16b99659851d86473f 89f6ad92ca661be86185d8f994cf4ff2893448b6 9d615b524dfc80c2b4907eb374dffac9406aec14 0bbe9d0df1a307270ca9601dc5fb34db5a7d81ef e3a4a1ae44dd263b25c8d360f5877992bb5de9c6 b2255128fe363e00b7c3c49fa5f0e545ba1e41ab 79b557856bb539b23b2050254ce6d47576333915 9d51c2388bf287da7bd3626cf0619bc63ae66390 878c2a70a3580d68e6909200e6eff007e29426a7 55e6e4820a44719dbb8b908a821787011bfd3ae0 e76fee871f9fe308cfaea2047c9e142b4d82b74c 92d917209f7536ce507b4072ca78238cfa4134b1 f0820a1229326e8d07a0a8859f4f0f4b9290e278 01a970f7c827ea1b6cd2966b39e44190c5b2ed8c 9af020c02ea622a20be5f3c595cd9b574ca03728 fab99943 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:56:34:da:9f:84:05:bd:be:37:27:33:a6:f4:b9:20:37:ff:74:9e] modulus: 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 public exponent: 10001 ]