2021-04-28 10:35:57,449 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-04-28 10:36:01,951 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-04-28 10:36:05.071  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-04-28 10:36:17.648 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-04-28 10:36:18.762  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-04-28 10:36:19.650  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-04-28 10:36:36.149  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 41.089 seconds (JVM running for 49.602) 2021-04-28 10:40:20.257  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 10:40:20.354 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 10:40:20.464 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-28 10:40:20.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 10:40:20.546  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-28 10:40:20.552  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 10:40:20.558  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 10:40:20.558  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 10:40:20.559  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 10:40:20.650  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 10:40:20.655  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 10:40:20.946  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 10:40:20.955  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 10:40:20.956  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 10:40:21.155  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 10:40:23.357  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 10:40:23.361  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 10:40:23.362 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 10:40:23.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 10:40:23.454  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 10:40:23.454  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 10:40:23.458  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 10:40:23.459  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 10:40:23.547  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 10:40:23.548  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 10:40:23.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 10:40:23.549 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 10:40:23.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 10:40:23.563 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 10:40:23.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 10:40:23.646 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 10:40:23.657 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 10:40:23.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:5a:8b:ae:db:87:2b:64:5f:b6:ed:4e:30:ae:5c:3d:9e:95:55:d6] modulus: 94904281855382ed1a2e45f1d728474f7c6c9388d9246954a4d4c0f00dd0cac7bc3f6687b2f38a108b0a9be088347117e6b264c8a40db673121820e4de8be3bf1b40a97ae120f09f162d464c9b3a3d9faa06f0e1f582786fd6bea7c37564f33db5098cf12981838adef23782b935c67d313c2177ee69b43a7b2fdf31e0b2efc92ca4246e06b6a05b0053e55325fe7a20ad2b47d8c255511ba1460a1718c617664c52ac73a4bd08abae1aca9747841f7f6f3c46b7e8584facf4d9fbd2777a5f17134b7e4a395efa39a9b54379025741fb426fa93aa7295c55cef88e73f1212381f6a248a0778d8021c6d7dc23a6553184840c16f15bd9c5ee628efdbb2ad3b2dd public exponent: 10001 ] 2021-04-28 11:57:06.377  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 11:57:06.380 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 11:57:06.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-28 11:57:06.383 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 11:57:06.384  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-28 11:57:06.385  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 11:57:06.385  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 11:57:06.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 11:57:06.386  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 11:57:06.393  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 11:57:06.394  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 11:57:06.394  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 11:57:06.449  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 11:57:06.631  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 11:57:06.645  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 11:57:06.646 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 11:57:06.650 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 11:57:06.651  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 11:57:06.652  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 11:57:06.657  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 11:57:06.658  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 11:57:06.658  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 11:57:06.659  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 11:57:06.659 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 11:57:06.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 11:57:06.660 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 11:57:06.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 11:57:06.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 11:57:06.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 11:57:06.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 11:57:06.753 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:1d:79:ae:aa:22:3d:5d:c7:6d:bb:8b:ab:69:27:ac:c1:e2:ec:a4] modulus: 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 public exponent: 10001 ] 2021-04-28 11:58:09.817  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 11:58:09.819 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 11:58:09.821 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-28 11:58:09.822 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 11:58:09.822  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-28 11:58:09.823  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 11:58:09.823  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 11:58:09.824  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 11:58:09.825  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 11:58:09.831  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 11:58:09.832  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 11:58:09.832  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 11:58:09.835  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 11:58:09.961  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 11:58:09.962  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 11:58:09.963 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 11:58:09.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 11:58:09.968  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 11:58:09.969  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 11:58:09.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 11:58:09.974  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 11:58:09.974  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 11:58:09.975  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 11:58:09.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 11:58:09.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 11:58:09.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 11:58:09.977 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 11:58:09.978 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 11:58:09.978 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 11:58:09.980 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 11:58:10.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:f2:48:b8:4e:e3:29:a4:6e:ec:93:78:f3:f7:3e:95:55:cb:38:24] modulus: 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 public exponent: 10001 ] 2021-04-28 12:01:21.494  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 12:01:21.496 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 12:01:21.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-28 12:01:21.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 12:01:21.500  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-28 12:01:21.500  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 12:01:21.501  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 12:01:21.501  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 12:01:21.501  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 12:01:21.506  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 12:01:21.506  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:01:21.507  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:01:21.508  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 12:01:21.651  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 12:01:21.652  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 12:01:21.653 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 12:01:21.655 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 12:01:21.656  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 12:01:21.656  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 12:01:21.658  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 12:01:21.658  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 12:01:21.659  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 12:01:21.659  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 12:01:21.660 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:01:21.660 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:01:21.660 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:01:21.661 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:01:21.661 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:01:21.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:01:21.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 12:01:21.667 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:94:a0:10:30:d4:1a:55:9e:54:a0:0b:a9:ed:4f:6d:d5:35:b0:95] modulus: 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 public exponent: 10001 ] 2021-04-28 12:01:47.182  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 12:01:47.184 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 12:01:47.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-28 12:01:47.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 12:01:47.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-28 12:01:47.187  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 12:01:47.188  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 12:01:47.188  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 12:01:47.189  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 12:01:47.194  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 12:01:47.194  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:01:47.195  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:01:47.246  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 12:01:47.322  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 12:01:47.323  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 12:01:47.346 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 12:01:47.348 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 12:01:47.349  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 12:01:47.349  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 12:01:47.351  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 12:01:47.352  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 12:01:47.353  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 12:01:47.353  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 12:01:47.354 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:01:47.354 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:01:47.354 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:01:47.357 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:01:47.357 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:01:47.357 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:01:47.358 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 12:01:47.361 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:1b:2f:cd:be:1f:40:8f:28:d8:f7:15:16:53:69:32:97:e8:b8:5b] modulus: 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 public exponent: 10001 ] 2021-04-28 12:02:26.464  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 12:02:26.465 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 12:02:26.467 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-28 12:02:26.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 12:02:26.468  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-28 12:02:26.469  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 12:02:26.470  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 12:02:26.470  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 12:02:26.470  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 12:02:26.480  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 12:02:26.545  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:02:26.547  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:02:26.549  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 12:02:26.660  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 12:02:26.662  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 12:02:26.662 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 12:02:26.665 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 12:02:26.667  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 12:02:26.668  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 12:02:26.669  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 12:02:26.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 12:02:26.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 12:02:26.671  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 12:02:26.671 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:02:26.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:02:26.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:02:26.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:02:26.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:02:26.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:02:26.675 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 12:02:26.679 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:70:3e:34:06:2b:fc:f9:d0:16:69:4e:b6:54:63:75:95:89:fc:5f] modulus: 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 public exponent: 10001 ] 2021-04-28 12:03:08.315  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 12:03:08.317 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 12:03:08.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-28 12:03:08.319 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 12:03:08.320  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-28 12:03:08.321  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 12:03:08.321  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 12:03:08.322  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 12:03:08.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 12:03:08.327  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 12:03:08.328  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:03:08.345  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:03:08.347  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 12:03:08.461  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 12:03:08.462  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 12:03:08.462 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 12:03:08.464 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 12:03:08.465  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 12:03:08.465  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 12:03:08.466  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 12:03:08.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 12:03:08.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 12:03:08.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 12:03:08.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:03:08.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:03:08.469 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:03:08.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:03:08.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:03:08.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:03:08.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 12:03:08.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:25:40:92:fd:a5:98:3e:a8:cf:76:42:e1:26:b8:d3:e0:bf:1e:9d] modulus: 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 public exponent: 10001 ] 2021-04-28 12:03:35.777  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 12:03:35.779 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 12:03:35.781 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-28 12:03:35.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 12:03:35.783  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-28 12:03:35.784  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 12:03:35.785  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 12:03:35.785  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 12:03:35.785  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 12:03:35.791  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 12:03:35.792  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:03:35.792  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:03:35.794  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 12:03:35.940  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 12:03:35.940  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 12:03:35.941 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 12:03:35.942 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 12:03:35.943  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 12:03:35.944  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 12:03:35.946  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 12:03:35.947  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 12:03:35.947  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 12:03:35.947  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 12:03:35.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:03:35.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:03:35.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:03:35.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:03:35.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:03:35.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:03:35.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 12:03:35.955 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: e80dbf363927f37f70e2a805237776555f182bdfdbb5c95eef792f7aa356410c7dbaeab98ef0d38e8a44be4410b9aacbdf09a37093c832a2eba3dd8fba4fadb4ef6131957a868169a293d9d74ca2c8dc23cde0b220162d8ec5cf4db64a887e831aad946c2111e68167e0aa5610b303befbc495b8fa2387d5ac04210b5f58de6f444e177197bc09133301f55c23af9e7f3139ff16897f4831677e79cc63c9ae3a513e39f659af68ce4c58c4d694d68542893808f774d4500d2a15fd8c5c7b03682df5aaeff7a0b3b699daa4e370e0e21e89aabab804ef112f74308fb52f1753a6e80a8d454e7bc4f62e23844328499ac4b3565ad877670bbe66ecbbe0808d0df242cd3bbf6c581d59486f8068b0b70f1aaf83c25891b5a9b45a71c9d26f484438ca3a30dd877e19829012249ed1d22d93ac559c79fdf49f0dea209a096c2e16b02fe6379f0282b7946e0d3762a5b88e3295873ccbdf091099a9315b81e08a1b70cea21983c4f0aa1a1872ddf420efcbf7f98040c6ca5c75a7756aec75520156c7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:ff:92:80:40:34:d6:69:11:0e:d2:e0:dd:2f:9d:82:75:a5:05:d0] modulus: 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 public exponent: 10001 ] 2021-04-28 12:05:21.501  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 12:05:21.503 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 12:05:21.504 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-04-28 12:05:21.505 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 12:05:21.505  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-04-28 12:05:21.506  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 12:05:21.506  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 12:05:21.507  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 12:05:21.507  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 12:05:21.511  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 12:05:21.511  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:05:21.511  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:05:21.512  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 12:05:21.645  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 12:05:21.646  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 12:05:21.646 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 12:05:21.647 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 12:05:21.648  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 12:05:21.648  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 12:05:21.649  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 12:05:21.649  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 12:05:21.650  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 12:05:21.650  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 12:05:21.650 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:05:21.650 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:05:21.651 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:05:21.651 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:05:21.651 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:05:21.651 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:05:21.652 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 12:05:21.654 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6b:18:ce:ae:a3:af:3d:1d:ce:51:0b:92:f2:a7:ba:c6:00:91:f1:a7] modulus: 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 public exponent: 10001 ] 2021-04-28 12:08:15.152  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 12:08:15.153 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 12:08:15.154 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-28 12:08:15.155 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 12:08:15.155  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-28 12:08:15.156  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 12:08:15.156  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 12:08:15.157  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 12:08:15.159  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 12:08:15.163  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 12:08:15.164  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:08:15.164  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:08:15.165  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 12:08:15.311  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 12:08:15.312  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 12:08:15.313 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 12:08:15.314 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 12:08:15.314  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 12:08:15.315  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 12:08:15.316  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 12:08:15.316  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 12:08:15.316  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 12:08:15.317  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 12:08:15.317 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:08:15.317 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:08:15.317 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:08:15.318 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:08:15.318 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:08:15.318 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:08:15.319 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 12:08:15.321 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [96:4c:12:a4:9e:1c:1c:e7:1d:e8:1d:c6:b0:19:33:ea:59:65:85:3c] modulus: 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 public exponent: 10001 ] 2021-04-28 12:11:35.154  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 12:11:35.156 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 12:11:35.158 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-28 12:11:35.159 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 12:11:35.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-28 12:11:35.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 12:11:35.161  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 12:11:35.162  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 12:11:35.163  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 12:11:35.169  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 12:11:35.169  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:11:35.169  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:11:35.170  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 12:11:35.267  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 12:11:35.268  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 12:11:35.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 12:11:35.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 12:11:35.270  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 12:11:35.271  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 12:11:35.272  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 12:11:35.272  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 12:11:35.272  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 12:11:35.272  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 12:11:35.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:11:35.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:11:35.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:11:35.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:11:35.274 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:11:35.274 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:11:35.274 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 12:11:35.277 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d9:a2:b8:66:ae:fb:ce:4f:07:87:af:d9:d8:5e:bf:fb:0a:c1:70:ee] modulus: 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 public exponent: 10001 ] 2021-04-28 12:13:32.257  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 12:13:32.261 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 12:13:32.347 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-28 12:13:32.348 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 12:13:32.349  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-28 12:13:32.349  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 12:13:32.351  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 12:13:32.352  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 12:13:32.352  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 12:13:32.362  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 12:13:32.362  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:13:32.363  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:13:32.364  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 12:13:32.560  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 12:13:32.560  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 12:13:32.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 12:13:32.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 12:13:32.564  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 12:13:32.564  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 12:13:32.566  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 12:13:32.567  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 12:13:32.567  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 12:13:32.568  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 12:13:32.568 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:13:32.568 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:13:32.568 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:13:32.569 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:13:32.569 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:13:32.569 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:13:32.570 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 12:13:32.572 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [09:58:8d:c2:78:e4:e6:1e:f8:de:66:9e:a6:1d:cf:f4:80:89:9f:35] modulus: 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 public exponent: 10001 ] 2021-04-28 12:15:07.241  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-28 12:15:07.242 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-28 12:15:07.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-28 12:15:07.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-28 12:15:07.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-28 12:15:07.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-28 12:15:07.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-28 12:15:07.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-28 12:15:07.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-28 12:15:07.250  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-28 12:15:07.251  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:15:07.251  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-28 12:15:07.252  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-28 12:15:07.349  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-28 12:15:07.350  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-28 12:15:07.350 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-28 12:15:07.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-28 12:15:07.352  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1295 2021-04-28 12:15:07.352  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-28 12:15:07.353  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-28 12:15:07.353  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-28 12:15:07.353  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-28 12:15:07.354  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-28 12:15:07.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:15:07.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:15:07.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:15:07.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-28 12:15:07.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-28 12:15:07.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-28 12:15:07.356 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-28 12:15:07.358 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 485727530186183871711523261300256213008714221891 IssuerDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 28 10:32:47 UTC 2021 Final Date: Mon Apr 28 10:32:47 UTC 2031 SubjectDN: UID=c-0130c357e*/660f3c,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:fe:2d:ce:9a:d1:9c:eb:d5:ca:84:c2:f2:a0:64:52:04:69:b0:ba] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 53c785311090e2f9dcc7159756c45dbec6fab4d6 d6d5bab4e896ed0727fa39762fea28fd27e3fce1 3092d7bd94296b50d3c0fde64355373ddca06f07 c4868209cabdd161268e4022af5401720c74527b eb37d842f02632e3111469f1a60953e642401533 bbe76e97745a5cb29ca215d015dac4c823551c4d c9109212e14dd95b131b1006aee84c1158d8abed 26b595b7065091db36df3f44ec861a14c1291114 ab63fc7ffd8a589e63788d72e6180101496eeac0 740a2e0a93ce9b873aa92b037a2d8ad985d6e113 652aad5b08c43a3fa75abc79ad2c683ff3d17995 1580ce3863324d5f05ba72ec93c05a474750c58e 3ca41f3d52872ba701b88eaf9000720781e03539 d4f7801648e0aa80ab555e3b791a9697481e1d21 f39db4ffde9f381f34a53c9abd486b3115a39019 973b80b41d925fbd76d753ea1175a25b4725d500 d17b69d2ce95b3754187ce9199831b5d6dce70d9 006c5308425b8ccdafd78713d95a607ce23af3b9 8f3e6cc609e016f9763d417fc853ae03d2f75ed4 3b14434e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:e8:e1:0c:1a:6e:fe:f3:0f:c8:d2:9f:8d:b9:d0:e9:f3:1b:23:c4] modulus: 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 public exponent: 10001 ]