2021-04-15 00:36:49,789 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-04-15 00:36:53,495 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-04-15 00:36:56.191  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-04-15 00:37:06.694 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-04-15 00:37:07.695  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-04-15 00:37:08.392  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-04-15 00:37:21.686  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 33.905 seconds (JVM running for 40.862) 2021-04-15 01:02:17.885  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 01:02:17.896 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 01:02:18.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-15 01:02:18.096 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 01:02:18.110  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-15 01:02:18.185  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 01:02:18.190  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 01:02:18.190  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 01:02:18.191  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 01:02:18.197  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 01:02:18.284  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 01:02:18.402  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 01:02:18.490  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 01:02:18.490  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 01:02:18.583  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 01:02:19.606  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 01:02:19.610  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 01:02:19.611 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 01:02:19.616 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 01:02:19.618  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 01:02:19.618  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 01:02:19.623  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 01:02:19.623  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 01:02:19.685  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 01:02:19.686  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 01:02:19.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 01:02:19.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 01:02:19.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 01:02:19.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 01:02:19.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 01:02:19.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 01:02:19.784 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 01:02:19.891 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:f9:6d:ef:8e:95:c0:28:dc:98:e2:ab:55:e3:28:54:59:be:96:40] modulus: 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 public exponent: 10001 ] 2021-04-15 02:00:56.437  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:00:56.439 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:00:56.440 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-15 02:00:56.443 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:00:56.451  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-15 02:00:56.452  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:00:56.452  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:00:56.453  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:00:56.454  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:00:56.488  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:00:56.490  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:00:56.490  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:00:56.494  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:00:56.701  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:00:56.702  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:00:56.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:00:56.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:00:56.706  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:00:56.707  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:00:56.710  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:00:56.710  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:00:56.711  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:00:56.711  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:00:56.712 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:00:56.712 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:00:56.713 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:00:56.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:00:56.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:00:56.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:00:56.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:00:56.791 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [22:b0:b5:54:d6:bd:1b:48:3e:25:a7:cd:13:dc:cf:36:39:aa:56:26] modulus: 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 public exponent: 10001 ] 2021-04-15 02:02:14.809  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:02:14.811 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:02:14.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-15 02:02:14.812 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:02:14.813  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-15 02:02:14.813  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:02:14.814  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:02:14.814  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:02:14.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:02:14.823  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:02:14.824  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:02:14.825  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:02:14.826  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:02:15.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:02:15.041  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:02:15.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:02:15.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:02:15.044  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:02:15.045  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:02:15.046  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:02:15.047  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:02:15.047  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:02:15.048  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:02:15.048 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:02:15.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:02:15.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:02:15.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:02:15.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:02:15.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:02:15.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:02:15.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: c8ce70b927fa7c54a7231a3f23d8981186e65c2c685108d783f14bafeebbc7683ba304a5b769cbfa90789c7be964c9de1e58adc6dbe76f1753a5ef186ff23f035119fb1af180f68a8f1dfd23fbbab532baf023121c54b24975e4624c373bd71a0fb2a4edf0a36a58e90642ed3737f27b7e577a0b49022f608eebd7701eed3c410d21df9ebdd4067a7e9d8a52c9123b3dc11751213ebcbbe84f3228855d86550a5aa9e4211b525a1048cc93d65f1615a6d14cf41790267ce9b1fc273f83e0bfd54ddc6b218f0a7959444c544950265f86cebc47a5f0b1c28f41daef0829c9e054aa097e1d9bf45d53884f0723ce622c39c3245eb4bb14f5cea132d8df1c15d70e2d9b2c9508b88325541737b02058b3684cab27c22f69d7afcbe16e622e18d37df554d0fda9cd4dc91a278a84efab2f58bfe811af5cf243e86dcd3780088976d9ca83e99389d9378dda6e87a01a01520a3d810fc22d14e4306ada08a8c820f191e0f8dd875c9b4ca0a1d9214a3c622666ffc891cc5a3b6e76691369f5ced5967d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:a9:12:0c:de:14:b2:99:a0:57:d9:6c:e5:04:99:6d:15:05:87:8d] modulus: 83a69f8f53a7980849b52a1d26bab10dfdc826dfda59e12661217b9f18a5b1f89e533db1c032cd0339cc1da1897a4a7954680c166261bf6b34ab3f3a90b861455a9dd6b52f1c4f59c9ab22c9f6af63f0a8ec933c40df30e4ddeef6eccecdc0fdb63445dc8483d5f82b9cce3b5227f07a5895ead65748ea6a7a35d2ed924acd55a6a9c9c829496ef7350ed26849c22155928b4674fd38f635deeac1e81e9c6587491575f0d64573a0f84067fa09fa225933b42229f84f341f0aacf0396752ebfe8a0ea01aef15366870bb0950c5b9d6e4c1fbf69454c8148e4851bbaf35d1975cd54bb69f141ea271d9cccc8b4ebac73a587555de401422538603ae9e82b9ab87 public exponent: 10001 ] 2021-04-15 02:06:22.753  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:06:22.755 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:06:22.756 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-15 02:06:22.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:06:22.758  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-15 02:06:22.758  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:06:22.759  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:06:22.759  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:06:22.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:06:22.765  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:06:22.765  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:06:22.765  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:06:22.767  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:06:22.885  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:06:22.886  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:06:22.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:06:22.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:06:22.888  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:06:22.888  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:06:22.890  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:06:22.890  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:06:22.891  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:06:22.891  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:06:22.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:06:22.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:06:22.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:06:22.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:06:22.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:06:22.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:06:22.894 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:06:22.897 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:90:3b:65:6f:a9:a2:7c:2d:1d:72:38:98:85:fd:dd:c6:ab:aa:47] modulus: 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 public exponent: 10001 ] 2021-04-15 02:06:29.087  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:06:29.090 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:06:29.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-15 02:06:29.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:06:29.093  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-15 02:06:29.093  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:06:29.094  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:06:29.094  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:06:29.094  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:06:29.100  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:06:29.100  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:06:29.100  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:06:29.181  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:06:29.264  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:06:29.265  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:06:29.265 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:06:29.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:06:29.268  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:06:29.269  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:06:29.281  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:06:29.282  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:06:29.283  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:06:29.283  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:06:29.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:06:29.283 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:06:29.284 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:06:29.284 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:06:29.285 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:06:29.285 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:06:29.286 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:06:29.288 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:45:1c:68:78:e2:79:12:49:db:08:ff:de:a4:4a:be:1c:61:8d:7d] modulus: 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 public exponent: 10001 ] 2021-04-15 02:07:11.669  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:07:11.669 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:07:11.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-15 02:07:11.671 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:07:11.671  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-15 02:07:11.672  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:07:11.672  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:07:11.672  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:07:11.672  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:07:11.677  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:07:11.677  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:07:11.677  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:07:11.679  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:07:11.757  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:07:11.757  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:07:11.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:07:11.759 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:07:11.760  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:07:11.760  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:07:11.764  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:07:11.764  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:07:11.764  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:07:11.765  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:07:11.765 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:07:11.765 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:07:11.765 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:07:11.766 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:07:11.766 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:07:11.766 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:07:11.767 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:07:11.769 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [89:0d:cc:14:0f:d7:4f:f7:b0:69:22:20:a2:93:88:e9:61:21:09:c2] modulus: 9df8f85ff14def575d803de923cbb7e557edf11c1f7fc02c540d2c99f79967fb138ac797e8bb8e665896caadb0f86848e935b18b8a7d9eedd905b365ca2804ca7391f6227421fe8b54cb6feb9bfeb532eb76aa3f9024504a3a3bd3468b498ed3aaf6a285bf7ea6ab9fd41b052fdb38664fdce1432563b53fc79956cc6597ef26b7f93a1c71f24d2c5799e9dd92a00ea7f2fd990ca69b37b81f0c144cda26c908a6852954db44da4a42fd979709e8f0522953444dd635e3410f534df2c68245540f54fe58c63ae2144a9f77466d2aa3a0a33f2776d0dad4ede9dbdb6bffa0a6e0d3e4b52e2ce94beec8765946786b584541b61edde491f5a0c0de8d0332a0da79 public exponent: 10001 ] 2021-04-15 02:07:17.758  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:07:17.759 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:07:17.760 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-15 02:07:17.761 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:07:17.761  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-15 02:07:17.762  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:07:17.762  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:07:17.762  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:07:17.763  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:07:17.766  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:07:17.767  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:07:17.767  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:07:17.768  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:07:17.855  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:07:17.856  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:07:17.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:07:17.858 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:07:17.859  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:07:17.859  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:07:17.861  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:07:17.861  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:07:17.862  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:07:17.862  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:07:17.863 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:07:17.863 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:07:17.863 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:07:17.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:07:17.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:07:17.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:07:17.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:07:17.868 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:a7:37:35:d5:59:95:6d:0a:fb:fc:e9:b5:2c:11:c7:82:73:3a:f2] modulus: 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 public exponent: 10001 ] 2021-04-15 02:09:12.337  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:09:12.338 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:09:12.339 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-04-15 02:09:12.340 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:09:12.340  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-04-15 02:09:12.340  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:09:12.341  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:09:12.341  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:09:12.341  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:09:12.345  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:09:12.346  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:09:12.346  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:09:12.347  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:09:12.437  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:09:12.438  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:09:12.438 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:09:12.439 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:09:12.440  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:09:12.440  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:09:12.442  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:09:12.443  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:09:12.443  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:09:12.444  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:09:12.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:09:12.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:09:12.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:09:12.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:09:12.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:09:12.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:09:12.446 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:09:12.448 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:a8:de:f3:40:65:c5:0b:dc:61:d8:04:1d:c6:ed:0e:6c:b8:8f:68] modulus: 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 public exponent: 10001 ] 2021-04-15 02:09:36.044  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:09:36.045 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:09:36.046 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-15 02:09:36.047 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:09:36.047  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-15 02:09:36.048  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:09:36.048  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:09:36.049  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:09:36.049  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:09:36.053  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:09:36.054  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:09:36.054  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:09:36.056  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:09:36.113  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:09:36.114  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:09:36.114 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:09:36.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:09:36.116  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:09:36.116  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:09:36.117  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:09:36.118  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:09:36.118  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:09:36.119  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:09:36.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:09:36.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:09:36.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:09:36.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:09:36.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:09:36.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:09:36.122 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:09:36.124 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cd:64:f1:c7:55:1f:6f:de:aa:12:09:3e:73:e8:1e:54:52:c2:5b:42] modulus: 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 public exponent: 10001 ] 2021-04-15 02:11:17.814  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:11:17.815 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:11:17.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-15 02:11:17.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:11:17.818  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-15 02:11:17.819  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:11:17.819  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:11:17.820  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:11:17.821  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:11:17.825  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:11:17.825  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:11:17.825  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:11:17.827  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:11:17.908  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:11:17.909  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:11:17.909 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:11:17.911 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:11:17.911  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:11:17.911  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:11:17.913  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:11:17.913  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:11:17.913  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:11:17.913  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:11:17.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:11:17.914 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:11:17.914 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:11:17.914 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:11:17.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:11:17.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:11:17.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:11:17.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [57:53:fb:08:08:10:94:33:06:3f:f8:51:a3:0e:80:72:7e:21:cb:d7] modulus: 8f209759eeda3f1f5cd8b201aa4942627861b361df8e4c16967b1d81b0c48e8c09ce23b4b2487ce8e068f1512e38b3113cc1a6f44e98d6b126d125287d043089fa0151eaaff9a15465c044b09701fd8cbeeeef140952a88506358ae228927e5e74bb7e374faccd21f46fae7e1e0d980a015ad200a7ec7ce346d625e5e6e3dd1f7c7730d1f1e98f29ddceb4424a3a295dd595b92446b23e80b5f03b09763a957bcaf5bdc6e7e5228699138f4ebe325b32e4422cadfeef1f10a720a0fffe25aa293e664057ccf7d5392f687842d26549510d45a930ab40d4f718ed95faf924879a2058bca4ef287552d577de9cbdc792a6be89b330bff77b34762d50678b820f9b public exponent: 10001 ] 2021-04-15 02:14:05.186  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:14:05.187 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:14:05.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-15 02:14:05.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:14:05.190  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-15 02:14:05.190  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:14:05.191  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:14:05.191  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:14:05.192  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:14:05.283  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:14:05.284  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:14:05.284  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:14:05.285  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:14:05.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:14:05.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:14:05.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:14:05.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:14:05.383  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:14:05.384  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:14:05.385  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:14:05.385  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:14:05.386  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:14:05.386  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:14:05.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:14:05.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:14:05.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:14:05.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:14:05.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:14:05.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:14:05.388 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:14:05.390 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: c8ce70b927fa7c54a7231a3f23d8981186e65c2c685108d783f14bafeebbc7683ba304a5b769cbfa90789c7be964c9de1e58adc6dbe76f1753a5ef186ff23f035119fb1af180f68a8f1dfd23fbbab532baf023121c54b24975e4624c373bd71a0fb2a4edf0a36a58e90642ed3737f27b7e577a0b49022f608eebd7701eed3c410d21df9ebdd4067a7e9d8a52c9123b3dc11751213ebcbbe84f3228855d86550a5aa9e4211b525a1048cc93d65f1615a6d14cf41790267ce9b1fc273f83e0bfd54ddc6b218f0a7959444c544950265f86cebc47a5f0b1c28f41daef0829c9e054aa097e1d9bf45d53884f0723ce622c39c3245eb4bb14f5cea132d8df1c15d70e2d9b2c9508b88325541737b02058b3684cab27c22f69d7afcbe16e622e18d37df554d0fda9cd4dc91a278a84efab2f58bfe811af5cf243e86dcd3780088976d9ca83e99389d9378dda6e87a01a01520a3d810fc22d14e4306ada08a8c820f191e0f8dd875c9b4ca0a1d9214a3c622666ffc891cc5a3b6e76691369f5ced5967d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [06:1e:5f:19:7c:fa:e9:2f:09:db:fb:6d:64:65:89:de:83:f1:b9:61] modulus: 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 public exponent: 10001 ] 2021-04-15 02:15:31.087  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:15:31.088 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:15:31.089 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-15 02:15:31.090 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:15:31.090  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-15 02:15:31.090  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:15:31.090  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:15:31.091  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:15:31.091  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:15:31.094  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:15:31.095  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:15:31.095  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:15:31.096  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:15:31.194  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:15:31.194  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:15:31.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:15:31.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:15:31.196  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:15:31.196  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:15:31.197  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:15:31.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:15:31.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:15:31.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:15:31.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:15:31.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:15:31.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:15:31.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:15:31.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:15:31.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:15:31.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:15:31.202 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:f2:33:22:b2:42:ce:0d:4e:c8:16:aa:e4:8e:6a:2d:7f:5c:ca:8f] modulus: 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 public exponent: 10001 ] 2021-04-15 02:16:12.885  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:16:12.886 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:16:12.887 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-15 02:16:12.887 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:16:12.888  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-15 02:16:12.888  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:16:12.888  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:16:12.888  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:16:12.889  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:16:12.893  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:16:12.894  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:16:12.894  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:16:12.896  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:16:12.981  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:16:12.982  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:16:12.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:16:12.983 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:16:12.983  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:16:12.984  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:16:12.985  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:16:12.985  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:16:12.985  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:16:12.986  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:16:12.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:16:12.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:16:12.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:16:12.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:16:12.987 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:16:12.987 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:16:12.987 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:16:12.990 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:ad:2f:69:f3:7c:c1:dc:20:ad:d3:d3:d4:81:57:29:3f:89:bd:02] modulus: b677dd358663775d26e6a9cb2f2026ef737033f4f10d098b82a5e784eb3b7a2a1b63932023e278bb449136c5ab7b8f180634c3a69502c3bd39c57e0227e03d93269504530c5cd6c474cc157dc49fa918da6a1f08426d8fa6bc2fa6f402d715da86081626cf1015764ec740610a041c06aa04f74ddd4fac37d89e7d63a1d5c4cfeb24ca40ff2762fe2d9f74b350e13e0d7ed9cbf5746d8c06bdb73cc958eb5211d3984029b04176349c6179c3bdf926fedfa2da08c7ff6c8efc8206a5e2390177f37df86012cfa9fa7c00bf32c5c1244c650c744516f49bc02854f623d9cb66ab7cf445f871b72ad9cbbd34304393260ea353885dce5a386dd8d922989a17c9a1 public exponent: 10001 ] 2021-04-15 02:17:07.102  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:17:07.102 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:17:07.103 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-15 02:17:07.104 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:17:07.104  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-15 02:17:07.104  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:17:07.104  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:17:07.105  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:17:07.105  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:17:07.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:17:07.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:17:07.110  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:17:07.111  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:17:07.184  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:17:07.185  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:17:07.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:17:07.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:17:07.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:17:07.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:17:07.187  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:17:07.188  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:17:07.188  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:17:07.188  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:17:07.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:17:07.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:17:07.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:17:07.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:17:07.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:17:07.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:17:07.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:17:07.192 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:a5:bb:e4:15:35:79:3c:9f:98:43:6f:ac:4e:03:7e:74:4c:22:17] modulus: 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 public exponent: 10001 ] 2021-04-15 02:18:01.549  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:18:01.550 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:18:01.551 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-15 02:18:01.552 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:18:01.552  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-15 02:18:01.552  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:18:01.553  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:18:01.553  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:18:01.553  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:18:01.557  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:18:01.558  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:18:01.558  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:18:01.559  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:18:01.657  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:18:01.657  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:18:01.658 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:18:01.659 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:18:01.659  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:18:01.659  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:18:01.660  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:18:01.661  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:18:01.661  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:18:01.661  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:18:01.661 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:18:01.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:18:01.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:18:01.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:18:01.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:18:01.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:18:01.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:18:01.666 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:29:68:6c:85:a6:f5:fe:41:5d:5e:cb:3e:74:50:bb:2f:6e:93:f4] modulus: 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 public exponent: 10001 ] 2021-04-15 02:18:43.821  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-15 02:18:43.822 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-15 02:18:43.823 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-15 02:18:43.823 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-15 02:18:43.824  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-15 02:18:43.824  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-15 02:18:43.824  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-15 02:18:43.824  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-15 02:18:43.825  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-15 02:18:43.828  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-15 02:18:43.829  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:18:43.829  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-15 02:18:43.830  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-15 02:18:43.908  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-15 02:18:43.909  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-15 02:18:43.909 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-15 02:18:43.911 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-15 02:18:43.911  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1895 2021-04-15 02:18:43.911  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-15 02:18:43.912  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-15 02:18:43.913  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-15 02:18:43.913  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-15 02:18:43.913  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-15 02:18:43.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:18:43.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:18:43.914 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:18:43.914 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-15 02:18:43.914 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-15 02:18:43.914 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-15 02:18:43.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-15 02:18:43.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 308929872746464717539641963446501055068837674580 IssuerDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 15 00:33:13 UTC 2021 Final Date: Tue Apr 15 00:33:13 UTC 2031 SubjectDN: UID=c-04d6ae6f20370f45f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a3:43:2d:47:b2:db:63:72:7a:a0:d9:b3:f8:62:86:62:fa:36:70:67] modulus: c8ce70b927fa7c54a7231a3f23d8981186e65c2c685108d783f14bafeebbc7683ba304a5b769cbfa90789c7be964c9de1e58adc6dbe76f1753a5ef186ff23f035119fb1af180f68a8f1dfd23fbbab532baf023121c54b24975e4624c373bd71a0fb2a4edf0a36a58e90642ed3737f27b7e577a0b49022f608eebd7701eed3c410d21df9ebdd4067a7e9d8a52c9123b3dc11751213ebcbbe84f3228855d86550a5aa9e4211b525a1048cc93d65f1615a6d14cf41790267ce9b1fc273f83e0bfd54ddc6b218f0a7959444c544950265f86cebc47a5f0b1c28f41daef0829c9e054aa097e1d9bf45d53884f0723ce622c39c3245eb4bb14f5cea132d8df1c15d70e2d9b2c9508b88325541737b02058b3684cab27c22f69d7afcbe16e622e18d37df554d0fda9cd4dc91a278a84efab2f58bfe811af5cf243e86dcd3780088976d9ca83e99389d9378dda6e87a01a01520a3d810fc22d14e4306ada08a8c820f191e0f8dd875c9b4ca0a1d9214a3c622666ffc891cc5a3b6e76691369f5ced5967d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61432fd8a2dd971b19ea9fac10b2225d19f74c03 46d6efa6cfe4aa63c4419097e3c645090b93ab3d d496a19457853a2c0863077afe3f01771ecbdbf6 0ac9b9ab6855493f8a4a947b798e2015d5f0366a e3f446ca9c910ad5e722a1d175881707a2e1c7ee 639cc630a7f8ac93fc5336da684d5e019bbcf6da 61241e51ffe38c6a6c04f12765ffbda512283faf b7eadf91611b3043f73e5fe4fa075eb853575866 e1aa89494e5682310905e68db13c00f44de8aa65 23be92dc9265032959da1de0e70e4eef9ae94580 f165292124a4ce8037a14a0266dee266ec8816ed cdf304ed891050b6fb29e191a24a2aeed8d933b7 95c0462cd5bef831a87acaf210c14a67fb55800a ada10e228ea0a5e51cf1b2ae3208bda8d11936d4 7aad833b3402657ff6d7a1c6ba6261f84ee875b3 b1ec564106efdacd9915e319d0b379120e71b131 5e999920aed1faf6326ddf5a075d5d9135095bd2 4cc2c192171398fd0bb39d47b9b96574a4d27d32 e4aa7225b5cd0b1f61ac030c0044ffbea3d2cc8b bcfe85ad Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:a5:fe:6d:d9:bf:60:11:17:ac:fa:81:45:d2:d3:70:6d:0c:1f:13] modulus: 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 public exponent: 10001 ]