2021-05-01 00:13:43,356 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-01 00:13:47,457 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-01 00:13:50.165  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-01 00:14:00.867 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-01 00:14:01.957  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-01 00:14:02.659  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-01 00:14:16.068  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 34.903 seconds (JVM running for 41.391) 2021-05-01 00:25:35.761  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 00:25:35.856 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 00:25:35.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-01 00:25:35.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 00:25:36.065  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-01 00:25:36.069  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 00:25:36.074  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 00:25:36.154  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 00:25:36.155  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 00:25:36.164  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 00:25:36.168  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 00:25:36.366  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 00:25:36.374  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 00:25:36.375  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 00:25:36.462  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 00:25:37.566  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 00:25:37.570  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 00:25:37.570 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 00:25:37.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 00:25:37.657  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 00:25:37.657  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 00:25:37.660  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 00:25:37.661  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 00:25:37.667  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 00:25:37.667  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 00:25:37.668 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 00:25:37.669 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 00:25:37.669 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 00:25:37.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 00:25:37.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 00:25:37.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 00:25:37.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 00:25:37.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:89:74:db:3b:8e:59:75:99:ca:c1:f1:9c:06:4d:56:0e:29:5a:b3] modulus: 859320c5748926120eedffeab71e2b4ba6da730f5d76712c2b02a8e43e6b912e7a33c1e6f695c7751e6ced132a3e466f5e0e9bdb7c06f24500fd0ec2e5521766183cf002d1685413de6c42f569ed1c5281a8bdd6d8a805a7d68c3d1051ab3b4204ab3ca62fbb74b15e1b1741757c0eea90c994554ece3d8c36130d56b7490862c1fd3da7da4ffcc33ea1986117aa7cc97e5049a980c794285e22aede0280660a946f2c958565722815200ad19faf60d3c390e5ca0ac95e39bedd6c765998467e7eac7cde1698c247ec2150df5b0a4144235b04453cb395515d661fbc5fe5011c3ba0e6e109f809261dc2850e558913fe74a4bb292c07df626fc9e51007aeba63 public exponent: 10001 ] 2021-05-01 01:21:34.444  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:21:34.446 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:21:34.448 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 01:21:34.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:21:34.450  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 01:21:34.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:21:34.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:21:34.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:21:34.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:21:34.458  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:21:34.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:21:34.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:21:34.462  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:21:34.630  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:21:34.631  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:21:34.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:21:34.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:21:34.656  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:21:34.657  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:21:34.659  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:21:34.659  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:21:34.660  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:21:34.660  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:21:34.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:21:34.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:21:34.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:21:34.666 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:21:34.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:21:34.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:21:34.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:21:34.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 9485ef3ffdfc78fd491eb34c31456215d8001af71eccf8cb622d9b1aadb6efce128a1d1624de006eaa70c3b54c6123a7386177a420b1d71eee562d751b020472d005fcf40a8d503a43f7007e900f57e91eef21053568b792027c214846f64996ad44e1fb414d101655916ebb7f1169e6b6d66755f31bf41d4bbe3ffd8580574766cda7eb9dfc4adde9f70d957837f059573dd2b54af61442032751c246b51377d57fb8bca2e252236fced666792418cf35e87974a3e4dd71e5683358615086522c109ebe03604a74fee4527d3c873b8e305f5ea3a7b6c80639836f734c0fe224e548c625ade91bb2ee9e52a383a007c841f1cf90ab78dccb30ff599a5f76db82d9e39f746730385a4c556546025ee22bf5dc32876e4f04612df0cb01a4ee36de77a7956075a2e9773459a860ed9d41fdcd17e11c3e754013e5b54e3d190a44add0f8071b1893595dd0c71edf4e05afa9e7f17e9e6523e702a776f3f006467598da6fcb99c2cb8431d25b49be17a11baad26eae095cfe1b3292b08581f0e24fb3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:2e:36:32:01:c3:f4:bb:3d:79:d2:1d:cf:99:b5:27:5f:78:48:9c] modulus: 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 public exponent: 10001 ] 2021-05-01 01:22:55.212  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:22:55.213 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:22:55.214 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-01 01:22:55.215 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:22:55.216  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-01 01:22:55.216  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:22:55.217  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:22:55.217  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:22:55.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:22:55.224  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:22:55.224  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:22:55.225  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:22:55.226  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:22:55.391  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:22:55.391  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:22:55.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:22:55.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:22:55.454  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:22:55.455  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:22:55.457  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:22:55.458  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:22:55.458  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:22:55.459  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:22:55.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:22:55.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:22:55.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:22:55.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:22:55.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:22:55.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:22:55.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:22:55.474 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:c1:5a:69:bd:6b:92:cc:1c:f7:f1:06:6c:15:c1:5e:30:96:6e:44] modulus: 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 public exponent: 10001 ] 2021-05-01 01:25:59.844  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:25:59.845 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:25:59.846 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-01 01:25:59.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:25:59.847  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-01 01:25:59.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:25:59.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:25:59.849  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:25:59.849  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:25:59.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:25:59.855  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:25:59.855  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:25:59.857  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:25:59.986  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:25:59.987  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:25:59.987 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:25:59.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:25:59.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:25:59.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:25:59.992  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:25:59.993  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:25:59.993  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:25:59.994  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:25:59.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:25:59.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:25:59.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:25:59.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:25:59.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:25:59.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:26:00.054 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:26:00.058 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 9485ef3ffdfc78fd491eb34c31456215d8001af71eccf8cb622d9b1aadb6efce128a1d1624de006eaa70c3b54c6123a7386177a420b1d71eee562d751b020472d005fcf40a8d503a43f7007e900f57e91eef21053568b792027c214846f64996ad44e1fb414d101655916ebb7f1169e6b6d66755f31bf41d4bbe3ffd8580574766cda7eb9dfc4adde9f70d957837f059573dd2b54af61442032751c246b51377d57fb8bca2e252236fced666792418cf35e87974a3e4dd71e5683358615086522c109ebe03604a74fee4527d3c873b8e305f5ea3a7b6c80639836f734c0fe224e548c625ade91bb2ee9e52a383a007c841f1cf90ab78dccb30ff599a5f76db82d9e39f746730385a4c556546025ee22bf5dc32876e4f04612df0cb01a4ee36de77a7956075a2e9773459a860ed9d41fdcd17e11c3e754013e5b54e3d190a44add0f8071b1893595dd0c71edf4e05afa9e7f17e9e6523e702a776f3f006467598da6fcb99c2cb8431d25b49be17a11baad26eae095cfe1b3292b08581f0e24fb3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:5d:76:c3:d6:12:53:93:4b:9a:45:6c:08:13:0d:af:08:f1:82:48] modulus: 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 public exponent: 10001 ] 2021-05-01 01:26:28.348  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:26:28.349 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:26:28.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-01 01:26:28.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:26:28.351  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-01 01:26:28.352  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:26:28.352  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:26:28.352  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:26:28.353  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:26:28.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:26:28.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:26:28.358  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:26:28.359  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:26:28.458  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:26:28.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:26:28.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:26:28.460 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:26:28.461  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:26:28.461  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:26:28.462  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:26:28.463  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:26:28.464  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:26:28.464  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:26:28.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:26:28.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:26:28.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:26:28.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:26:28.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:26:28.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:26:28.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:26:28.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:26:41:9b:a0:4f:b9:d2:d9:09:dd:64:03:b9:b6:9a:2d:1b:83:6c] modulus: 877138fd4f951c651cc58f53334f82b3bb28b4a1324b9c4ef59cc6085f0a2b7716ab7b10b49deacfe47461ae6e6b65f561d3bc6a9430218a0310ad817d8c7747d3a4fa58493ea190f6cc944b7fca9daea4b6a30bc5b1687eac414438ca99962af1032d17cf0f48309eeb1887e1f52d628c9d301b7dcb95137ca7b338925b0e29d4db25040c588288c96f6ca65ca94b314cf89f31903957669ec6e9716ec6f727377c8abee96fd1f7e22cdaf11d2143c4b7a9fd940ae998c1071a74f3f66edfc2e5857451df99c08befc79d4c23378279cc8d4d5b458593cf462b3bdc4117285b52fe573eb48ff7be20a40c254aa048b17fcb99738a337065d30a551742700321 public exponent: 10001 ] 2021-05-01 01:26:59.210  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:26:59.211 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:26:59.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-01 01:26:59.213 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:26:59.213  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-01 01:26:59.213  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:26:59.214  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:26:59.214  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:26:59.215  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:26:59.219  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:26:59.220  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:26:59.220  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:26:59.221  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:26:59.354  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:26:59.355  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:26:59.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:26:59.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:26:59.357  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:26:59.357  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:26:59.358  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:26:59.359  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:26:59.359  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:26:59.360  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:26:59.360 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:26:59.360 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:26:59.361 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:26:59.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:26:59.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:26:59.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:26:59.363 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:26:59.369 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:a3:f5:d0:bf:5b:2d:c7:43:22:6b:1f:59:ea:f1:2c:0f:e4:39:9e] modulus: 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 public exponent: 10001 ] 2021-05-01 01:27:16.890  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:27:16.891 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:27:16.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-01 01:27:16.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:27:16.893  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-01 01:27:16.894  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:27:16.894  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:27:16.895  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:27:16.895  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:27:16.899  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:27:16.900  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:27:16.900  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:27:16.901  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:27:17.005  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:27:17.054  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:27:17.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:27:17.056 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:27:17.057  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:27:17.057  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:27:17.058  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:27:17.059  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:27:17.059  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:27:17.060  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:27:17.060 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:27:17.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:27:17.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:27:17.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:27:17.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:27:17.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:27:17.063 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:27:17.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 9485ef3ffdfc78fd491eb34c31456215d8001af71eccf8cb622d9b1aadb6efce128a1d1624de006eaa70c3b54c6123a7386177a420b1d71eee562d751b020472d005fcf40a8d503a43f7007e900f57e91eef21053568b792027c214846f64996ad44e1fb414d101655916ebb7f1169e6b6d66755f31bf41d4bbe3ffd8580574766cda7eb9dfc4adde9f70d957837f059573dd2b54af61442032751c246b51377d57fb8bca2e252236fced666792418cf35e87974a3e4dd71e5683358615086522c109ebe03604a74fee4527d3c873b8e305f5ea3a7b6c80639836f734c0fe224e548c625ade91bb2ee9e52a383a007c841f1cf90ab78dccb30ff599a5f76db82d9e39f746730385a4c556546025ee22bf5dc32876e4f04612df0cb01a4ee36de77a7956075a2e9773459a860ed9d41fdcd17e11c3e754013e5b54e3d190a44add0f8071b1893595dd0c71edf4e05afa9e7f17e9e6523e702a776f3f006467598da6fcb99c2cb8431d25b49be17a11baad26eae095cfe1b3292b08581f0e24fb3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:c4:4e:1f:c7:7c:f2:e1:ec:5b:9a:1b:f2:96:5e:90:e5:10:17:d4] modulus: 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 public exponent: 10001 ] 2021-05-01 01:28:07.562  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:28:07.563 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:28:07.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-01 01:28:07.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:28:07.565  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-01 01:28:07.565  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:28:07.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:28:07.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:28:07.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:28:07.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:28:07.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:28:07.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:28:07.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:28:07.666  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:28:07.667  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:28:07.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:28:07.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:28:07.668  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:28:07.669  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:28:07.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:28:07.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:28:07.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:28:07.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:28:07.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:28:07.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:28:07.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:28:07.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:28:07.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:28:07.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:28:07.674 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:28:07.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:91:d3:ee:5d:94:1f:f5:d8:5b:4e:c8:c0:38:e5:47:bf:1a:6e:9a] modulus: 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 public exponent: 10001 ] 2021-05-01 01:29:19.119  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:29:19.120 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:29:19.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-01 01:29:19.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:29:19.122  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-01 01:29:19.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:29:19.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:29:19.124  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:29:19.124  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:29:19.128  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:29:19.129  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:29:19.129  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:29:19.130  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:29:19.278  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:29:19.279  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:29:19.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:29:19.280 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:29:19.281  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:29:19.281  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:29:19.282  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:29:19.282  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:29:19.283  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:29:19.283  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:29:19.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:29:19.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:29:19.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:29:19.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:29:19.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:29:19.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:29:19.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:29:19.288 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:52:82:29:ce:e1:dc:8d:b0:fb:6f:0c:36:94:e0:eb:ee:3f:c0:e9] modulus: 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 public exponent: 10001 ] 2021-05-01 01:31:57.605  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:31:57.606 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:31:57.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 01:31:57.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:31:57.608  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 01:31:57.608  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:31:57.609  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:31:57.609  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:31:57.609  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:31:57.613  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:31:57.613  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:31:57.614  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:31:57.615  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:31:57.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:31:57.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:31:57.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:31:57.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:31:57.759  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:31:57.760  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:31:57.761  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:31:57.761  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:31:57.761  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:31:57.762  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:31:57.762 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:31:57.762 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:31:57.762 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:31:57.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:31:57.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:31:57.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:31:57.764 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:31:57.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:11:77:73:33:e5:bd:87:95:06:d0:45:7e:16:e4:dd:93:13:fd:ec] modulus: 9958b6963eb19f9a9d5458441211571b7a491316f3dc270d3a564a64f425c74bcacbc7b1e5cf0a0f3a3aae442b9e65fc2310a5b6f53214dff4e20f5dd6c90f054f7a9890df730725484a8f5af66448d48889bc6326feaf59004014c097b4200b8512b19793fd74b7a28a70c5a579f3f5f8efc7b79415c023f5247e00e8cdd124a1798451a27deb799a24044d7761e95ccbccdde77902f30ae0d78444985b48ce7077b996c58972a1c3b88a870daffc69ba6cdcaa1460aeb9374a5937ae70f973ff40a610c2b0f4b8b6c3ae1624be68b20013804b544d88d5e0d1be9bd4537dc5697c96211de8b95697b56e8b0222ee692d9c3b5204aaf62ab5e187dc7291e895 public exponent: 10001 ] 2021-05-01 01:34:56.328  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:34:56.329 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:34:56.330 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 01:34:56.331 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:34:56.331  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 01:34:56.331  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:34:56.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:34:56.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:34:56.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:34:56.336  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:34:56.337  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:34:56.337  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:34:56.338  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:34:56.448  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:34:56.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:34:56.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:34:56.451 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:34:56.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:34:56.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:34:56.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:34:56.453  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:34:56.453  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:34:56.453  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:34:56.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:34:56.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:34:56.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:34:56.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:34:56.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:34:56.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:34:56.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:34:56.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:73:b2:15:80:04:63:5a:4a:f8:c1:5c:5f:4e:db:02:c4:c7:43:4c] modulus: cd9938b7263f26b7f3603dab4696cf2923bc2a692598ff7526e2eb385d734de1f49fcb963f73e841cb25b80b5520c6de160dc89ae7250db5d8a074413f260134dcdf7eb59ce5fc624a1ec5d9abcb30d3ff240c7c0df81d95a8c0587e93bb260d376add4ce02789a34cce8fcb09184540d5f62abde1b0d3da08b78df204a8738f8e5cc0f2fc964b8b27024866564c13edbffec245d64bf953b15f2a7f35ce7fc8f0eb01452c8bb03d820fa2f8849fc4446ea4cfdcd09c812a8f1e342d45987441cce4c734877da6df0e7507346667fdda7a69c04cd6ad1ee2cc451973ede28d30ffef3d533ac62ba376419028d5f20ce960ebd8c2bcd54194758b5dcd8939637b public exponent: 10001 ] 2021-05-01 01:36:40.999  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:36:41.002 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:36:41.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 01:36:41.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:36:41.003  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 01:36:41.004  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:36:41.004  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:36:41.004  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:36:41.005  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:36:41.009  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:36:41.009  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:36:41.009  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:36:41.010  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:36:41.113  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:36:41.114  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:36:41.114 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:36:41.115 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:36:41.116  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:36:41.116  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:36:41.117  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:36:41.117  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:36:41.118  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:36:41.118  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:36:41.118 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:36:41.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:36:41.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:36:41.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:36:41.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:36:41.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:36:41.121 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:36:41.124 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:11:dd:07:ce:59:10:ae:8c:be:4b:97:c4:19:5f:30:c7:53:1b:e2] modulus: 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 public exponent: 10001 ] 2021-05-01 01:38:04.661  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 01:38:04.662 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 01:38:04.663 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 01:38:04.664 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 01:38:04.664  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 01:38:04.665  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 01:38:04.665  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 01:38:04.665  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 01:38:04.666  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 01:38:04.670  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 01:38:04.670  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:38:04.670  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 01:38:04.671  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 01:38:04.775  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 01:38:04.775  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 01:38:04.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 01:38:04.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 01:38:04.777  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 01:38:04.777  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 01:38:04.778  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 01:38:04.778  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 01:38:04.779  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 01:38:04.779  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 01:38:04.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:38:04.780 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:38:04.780 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:38:04.780 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 01:38:04.781 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 01:38:04.781 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 01:38:04.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 01:38:04.784 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:15:ef:a0:a3:72:3f:73:c6:22:33:c0:34:27:5d:1d:29:03:fa:75] modulus: 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 public exponent: 10001 ] 2021-05-01 05:55:43.088  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 05:55:43.090 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 05:55:43.091 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-01 05:55:43.092 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 05:55:43.092  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-01 05:55:43.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 05:55:43.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 05:55:43.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 05:55:43.094  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 05:55:43.098  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 05:55:43.099  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 05:55:43.099  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 05:55:43.100  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 05:55:43.281  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 05:55:43.282  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 05:55:43.282 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 05:55:43.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 05:55:43.284  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 05:55:43.285  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 05:55:43.286  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 05:55:43.286  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 05:55:43.286  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 05:55:43.287  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 05:55:43.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 05:55:43.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 05:55:43.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 05:55:43.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 05:55:43.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 05:55:43.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 05:55:43.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 05:55:43.294 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:2f:78:7e:8c:5b:16:bc:d1:c5:11:0f:b2:13:45:49:9b:6e:4b:1a] modulus: 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 public exponent: 10001 ] 2021-05-01 07:34:00.687  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:34:00.689 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:34:00.690 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 07:34:00.691 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:34:00.691  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 07:34:00.692  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:34:00.692  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:34:00.693  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:34:00.693  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:34:00.697  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:34:00.698  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:34:00.698  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:34:00.699  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:34:00.803  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:34:00.804  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:34:00.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:34:00.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:34:00.808  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:34:00.809  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:34:00.810  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:34:00.811  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:34:00.811  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:34:00.811  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:34:00.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:34:00.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:34:00.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:34:00.813 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:34:00.813 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:34:00.814 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:34:00.815 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:34:00.818 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 9485ef3ffdfc78fd491eb34c31456215d8001af71eccf8cb622d9b1aadb6efce128a1d1624de006eaa70c3b54c6123a7386177a420b1d71eee562d751b020472d005fcf40a8d503a43f7007e900f57e91eef21053568b792027c214846f64996ad44e1fb414d101655916ebb7f1169e6b6d66755f31bf41d4bbe3ffd8580574766cda7eb9dfc4adde9f70d957837f059573dd2b54af61442032751c246b51377d57fb8bca2e252236fced666792418cf35e87974a3e4dd71e5683358615086522c109ebe03604a74fee4527d3c873b8e305f5ea3a7b6c80639836f734c0fe224e548c625ade91bb2ee9e52a383a007c841f1cf90ab78dccb30ff599a5f76db82d9e39f746730385a4c556546025ee22bf5dc32876e4f04612df0cb01a4ee36de77a7956075a2e9773459a860ed9d41fdcd17e11c3e754013e5b54e3d190a44add0f8071b1893595dd0c71edf4e05afa9e7f17e9e6523e702a776f3f006467598da6fcb99c2cb8431d25b49be17a11baad26eae095cfe1b3292b08581f0e24fb3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:73:34:63:36:d0:70:a9:fe:95:63:61:e3:70:a9:92:b6:ca:8b:84] modulus: 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 public exponent: 10001 ] 2021-05-01 07:35:44.061  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:35:44.062 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:35:44.062 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-01 07:35:44.063 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:35:44.063  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-01 07:35:44.063  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:35:44.063  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:35:44.064  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:35:44.064  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:35:44.068  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:35:44.069  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:35:44.069  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:35:44.070  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:35:44.175  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:35:44.176  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:35:44.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:35:44.177 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:35:44.178  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:35:44.178  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:35:44.178  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:35:44.179  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:35:44.179  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:35:44.179  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:35:44.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:35:44.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:35:44.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:35:44.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:35:44.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:35:44.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:35:44.181 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:35:44.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:ae:7f:06:6c:8c:fc:82:6a:f8:d6:15:18:10:d2:9a:bd:4c:ea:17] modulus: adc885826d1dc7d33301d92a6744a6a677c14a1dc20fd4957089f8b86a90009841fcd93adddb2d64f9f219cc5bb6acc86a0e7540d370ea018dcc80f642673ee264e510f24cbde76e4c1cf434bcae42b4d2d2d1b2475a45f1732096e690fb7fb469f40f4d83aab668a22d17ddbd53893d2c3f455ee89aec6d4191008208f60d0f7580f8dbd93f6dbdb2fd5f7ee82bfdd418e959903f8e6709b44ffa234c316da24ee1f2db5d52e7239933340758fddedb5b63959911d77377f91fadb2857b83d6900d045928525165b19fe612554210ecf9b620addb92196cffa2315da2f662dacafbd7a312a39b03a51eafdd08ab60ffc1b4e58c45b40ee670cb32877a1ed827 public exponent: 10001 ] 2021-05-01 07:36:57.586  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:36:57.587 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:36:57.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-01 07:36:57.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:36:57.588  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-01 07:36:57.589  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:36:57.589  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:36:57.589  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:36:57.590  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:36:57.594  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:36:57.594  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:36:57.595  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:36:57.596  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:36:57.711  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:36:57.712  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:36:57.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:36:57.713 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:36:57.713  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:36:57.713  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:36:57.714  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:36:57.715  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:36:57.715  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:36:57.715  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:36:57.715 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:36:57.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:36:57.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:36:57.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:36:57.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:36:57.716 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:36:57.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:36:57.719 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:f2:13:a0:bb:fc:db:60:0f:dc:62:fe:fe:2f:1e:8e:c6:07:2d:0c] modulus: 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 public exponent: 10001 ] 2021-05-01 07:37:47.396  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:37:47.397 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:37:47.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-01 07:37:47.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:37:47.398  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-01 07:37:47.399  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:37:47.399  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:37:47.399  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:37:47.399  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:37:47.403  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:37:47.404  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:37:47.404  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:37:47.405  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:37:47.498  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:37:47.498  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:37:47.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:37:47.500 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:37:47.500  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:37:47.500  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:37:47.501  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:37:47.501  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:37:47.502  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:37:47.502  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:37:47.502 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:37:47.502 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:37:47.502 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:37:47.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:37:47.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:37:47.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:37:47.504 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:37:47.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:22:04:de:f0:7e:bb:d6:c0:58:bf:a7:35:b6:c6:d5:af:d5:6d:f0] modulus: 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 public exponent: 10001 ] 2021-05-01 07:38:17.901  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:38:17.902 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:38:17.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-01 07:38:17.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:38:17.903  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-01 07:38:17.904  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:38:17.904  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:38:17.904  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:38:17.904  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:38:17.908  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:38:17.908  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:38:17.909  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:38:17.909  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:38:18.010  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:38:18.011  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:38:18.011 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:38:18.012 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:38:18.012  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:38:18.012  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:38:18.013  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:38:18.014  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:38:18.014  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:38:18.014  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:38:18.014 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:38:18.014 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:38:18.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:38:18.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:38:18.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:38:18.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:38:18.016 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:38:18.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 9485ef3ffdfc78fd491eb34c31456215d8001af71eccf8cb622d9b1aadb6efce128a1d1624de006eaa70c3b54c6123a7386177a420b1d71eee562d751b020472d005fcf40a8d503a43f7007e900f57e91eef21053568b792027c214846f64996ad44e1fb414d101655916ebb7f1169e6b6d66755f31bf41d4bbe3ffd8580574766cda7eb9dfc4adde9f70d957837f059573dd2b54af61442032751c246b51377d57fb8bca2e252236fced666792418cf35e87974a3e4dd71e5683358615086522c109ebe03604a74fee4527d3c873b8e305f5ea3a7b6c80639836f734c0fe224e548c625ade91bb2ee9e52a383a007c841f1cf90ab78dccb30ff599a5f76db82d9e39f746730385a4c556546025ee22bf5dc32876e4f04612df0cb01a4ee36de77a7956075a2e9773459a860ed9d41fdcd17e11c3e754013e5b54e3d190a44add0f8071b1893595dd0c71edf4e05afa9e7f17e9e6523e702a776f3f006467598da6fcb99c2cb8431d25b49be17a11baad26eae095cfe1b3292b08581f0e24fb3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [55:d8:ac:1a:b9:d2:e8:db:8a:e6:8e:49:09:c6:d6:3e:b7:3d:98:bf] modulus: 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 public exponent: 10001 ] 2021-05-01 07:38:29.410  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:38:29.411 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:38:29.412 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-01 07:38:29.412 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:38:29.412  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-01 07:38:29.413  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:38:29.413  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:38:29.413  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:38:29.413  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:38:29.417  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:38:29.417  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:38:29.418  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:38:29.418  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:38:29.489  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:38:29.489  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:38:29.489 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:38:29.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:38:29.491  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:38:29.491  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:38:29.492  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:38:29.492  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:38:29.492  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:38:29.492  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:38:29.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:38:29.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:38:29.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:38:29.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:38:29.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:38:29.494 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:38:29.494 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:38:29.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 9485ef3ffdfc78fd491eb34c31456215d8001af71eccf8cb622d9b1aadb6efce128a1d1624de006eaa70c3b54c6123a7386177a420b1d71eee562d751b020472d005fcf40a8d503a43f7007e900f57e91eef21053568b792027c214846f64996ad44e1fb414d101655916ebb7f1169e6b6d66755f31bf41d4bbe3ffd8580574766cda7eb9dfc4adde9f70d957837f059573dd2b54af61442032751c246b51377d57fb8bca2e252236fced666792418cf35e87974a3e4dd71e5683358615086522c109ebe03604a74fee4527d3c873b8e305f5ea3a7b6c80639836f734c0fe224e548c625ade91bb2ee9e52a383a007c841f1cf90ab78dccb30ff599a5f76db82d9e39f746730385a4c556546025ee22bf5dc32876e4f04612df0cb01a4ee36de77a7956075a2e9773459a860ed9d41fdcd17e11c3e754013e5b54e3d190a44add0f8071b1893595dd0c71edf4e05afa9e7f17e9e6523e702a776f3f006467598da6fcb99c2cb8431d25b49be17a11baad26eae095cfe1b3292b08581f0e24fb3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:55:be:56:15:a9:f1:a3:2d:65:95:2a:3d:b8:9d:1c:98:39:64:fe] modulus: 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 public exponent: 10001 ] 2021-05-01 07:38:49.269  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:38:49.270 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:38:49.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-01 07:38:49.271 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:38:49.272  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-01 07:38:49.272  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:38:49.272  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:38:49.273  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:38:49.273  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:38:49.277  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:38:49.277  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:38:49.277  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:38:49.278  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:38:49.387  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:38:49.388  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:38:49.388 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:38:49.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:38:49.390  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:38:49.390  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:38:49.391  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:38:49.391  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:38:49.391  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:38:49.391  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:38:49.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:38:49.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:38:49.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:38:49.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:38:49.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:38:49.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:38:49.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:38:49.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:e2:59:2f:45:65:0f:64:c9:70:86:2a:f6:ee:27:02:b8:0b:e1:97] modulus: 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 public exponent: 10001 ] 2021-05-01 07:40:34.161  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:40:34.162 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:40:34.163 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-01 07:40:34.163 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:40:34.163  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-01 07:40:34.163  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:40:34.164  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:40:34.164  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:40:34.164  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:40:34.168  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:40:34.168  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:40:34.168  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:40:34.169  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:40:34.266  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:40:34.266  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:40:34.266 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:40:34.267 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:40:34.268  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:40:34.268  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:40:34.269  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:40:34.269  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:40:34.269  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:40:34.269  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:40:34.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:40:34.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:40:34.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:40:34.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:40:34.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:40:34.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:40:34.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:40:34.273 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 9485ef3ffdfc78fd491eb34c31456215d8001af71eccf8cb622d9b1aadb6efce128a1d1624de006eaa70c3b54c6123a7386177a420b1d71eee562d751b020472d005fcf40a8d503a43f7007e900f57e91eef21053568b792027c214846f64996ad44e1fb414d101655916ebb7f1169e6b6d66755f31bf41d4bbe3ffd8580574766cda7eb9dfc4adde9f70d957837f059573dd2b54af61442032751c246b51377d57fb8bca2e252236fced666792418cf35e87974a3e4dd71e5683358615086522c109ebe03604a74fee4527d3c873b8e305f5ea3a7b6c80639836f734c0fe224e548c625ade91bb2ee9e52a383a007c841f1cf90ab78dccb30ff599a5f76db82d9e39f746730385a4c556546025ee22bf5dc32876e4f04612df0cb01a4ee36de77a7956075a2e9773459a860ed9d41fdcd17e11c3e754013e5b54e3d190a44add0f8071b1893595dd0c71edf4e05afa9e7f17e9e6523e702a776f3f006467598da6fcb99c2cb8431d25b49be17a11baad26eae095cfe1b3292b08581f0e24fb3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:5b:4b:4f:92:77:e9:27:89:8e:4f:71:56:1a:d2:54:ef:a3:e2:a5] modulus: 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 public exponent: 10001 ] 2021-05-01 07:41:48.041  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:41:48.042 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:41:48.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 07:41:48.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:41:48.043  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 07:41:48.044  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:41:48.044  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:41:48.044  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:41:48.044  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:41:48.048  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:41:48.048  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:41:48.048  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:41:48.049  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:41:48.147  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:41:48.147  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:41:48.147 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:41:48.148 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:41:48.149  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:41:48.149  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:41:48.150  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:41:48.150  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:41:48.150  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:41:48.150  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:41:48.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:41:48.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:41:48.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:41:48.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:41:48.152 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:41:48.152 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:41:48.152 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:41:48.154 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 9485ef3ffdfc78fd491eb34c31456215d8001af71eccf8cb622d9b1aadb6efce128a1d1624de006eaa70c3b54c6123a7386177a420b1d71eee562d751b020472d005fcf40a8d503a43f7007e900f57e91eef21053568b792027c214846f64996ad44e1fb414d101655916ebb7f1169e6b6d66755f31bf41d4bbe3ffd8580574766cda7eb9dfc4adde9f70d957837f059573dd2b54af61442032751c246b51377d57fb8bca2e252236fced666792418cf35e87974a3e4dd71e5683358615086522c109ebe03604a74fee4527d3c873b8e305f5ea3a7b6c80639836f734c0fe224e548c625ade91bb2ee9e52a383a007c841f1cf90ab78dccb30ff599a5f76db82d9e39f746730385a4c556546025ee22bf5dc32876e4f04612df0cb01a4ee36de77a7956075a2e9773459a860ed9d41fdcd17e11c3e754013e5b54e3d190a44add0f8071b1893595dd0c71edf4e05afa9e7f17e9e6523e702a776f3f006467598da6fcb99c2cb8431d25b49be17a11baad26eae095cfe1b3292b08581f0e24fb3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:e0:f3:43:bb:95:8f:07:63:20:15:53:24:b8:71:c1:cf:a2:ad:8a] modulus: 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 public exponent: 10001 ] 2021-05-01 07:44:00.681  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:44:00.682 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:44:00.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 07:44:00.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:44:00.683  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 07:44:00.684  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:44:00.684  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:44:00.684  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:44:00.684  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:44:00.688  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:44:00.688  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:44:00.688  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:44:00.689  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:44:00.761  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:44:00.761  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:44:00.762 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:44:00.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:44:00.763  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:44:00.763  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:44:00.764  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:44:00.765  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:44:00.765  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:44:00.765  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:44:00.765 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:44:00.765 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:44:00.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:44:00.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:44:00.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:44:00.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:44:00.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:44:00.768 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:11:01:49:4f:e3:47:fe:72:df:b5:08:98:d9:dd:2b:c2:bb:16:a6] modulus: 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 public exponent: 10001 ] 2021-05-01 07:45:57.240  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:45:57.241 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:45:57.241 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 07:45:57.242 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:45:57.242  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 07:45:57.243  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:45:57.243  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:45:57.244  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:45:57.244  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:45:57.248  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:45:57.248  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:45:57.249  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:45:57.249  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:45:57.354  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:45:57.354  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:45:57.354 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:45:57.355 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:45:57.356  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:45:57.356  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:45:57.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:45:57.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:45:57.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:45:57.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:45:57.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:45:57.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:45:57.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:45:57.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:45:57.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:45:57.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:45:57.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:45:57.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:99:b7:c3:ae:1f:08:f5:13:f7:d5:9c:33:69:49:8c:44:bb:9e:fb] modulus: 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 public exponent: 10001 ] 2021-05-01 07:47:24.482  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-01 07:47:24.483 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-01 07:47:24.486 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 07:47:24.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-01 07:47:24.487  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-01 07:47:24.487  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-01 07:47:24.487  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-01 07:47:24.488  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-01 07:47:24.488  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-01 07:47:24.492  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-01 07:47:24.492  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:47:24.492  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-01 07:47:24.493  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-01 07:47:24.593  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-01 07:47:24.593  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-01 07:47:24.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-01 07:47:24.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-01 07:47:24.594  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118 2021-05-01 07:47:24.595  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-01 07:47:24.595  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-01 07:47:24.596  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-01 07:47:24.596  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-01 07:47:24.596  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-01 07:47:24.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:47:24.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:47:24.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:47:24.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-01 07:47:24.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-01 07:47:24.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-01 07:47:24.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-01 07:47:24.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 125650379731563525896185753820732901588549361671 IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 01 00:09:19 UTC 2021 Final Date: Thu May 01 00:09:19 UTC 2031 SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8d871f70d9f9619d39888e17c1a806db43503683 27c873b7c14dc4bba5c4e22a5e371322f5f39b51 dc149ac0b40e4ff95e57ebcd50f2545da957932a 2072de8d2c99c111d4079386759f255d6695f1f7 728f07be3102f43c8c9127ba5bb79499e3713537 aa6d808e93485b6f7a053d69e96d1cf2e661a1ad ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e 822cbd178d87e14a7ba8147982d1370b447fe0f3 be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a 6fbae347d0877917c68fd1badadd5a4db0b000f9 bb490ede66b179c48d671ca2d456e8aae2ad1098 f0a653110c3ade53dcfedf7f2336bc43216653ba ce52bd87976e1299208d0d62e2d0bb64aa4cfa20 9f2853ce59056af621515fc1a18bc3b9932edeb6 50fa880c0c39c40d4499698a166302de53bd3685 192157b583b0d99f34cd1ef888c38e154241e852 da20911d285d01b0e93822931796cf0de4d71b4e 0aedefd066b2e65317a455222bda5bc22cd5968a b51cf91282196fb16778d2ca6c460253193b8ecf 0483d9ef Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:c7:7f:22:9f:00:bf:d5:bf:79:34:7a:dc:7c:a4:6c:cd:be:87:d6] modulus: 989b8ac2cbd80ea7e580e8046873cde8d4f626390e2ceea91cb71b924fb9ca7c1442291f98d24b95c47b1506b1bb7d084d793111a0cfa32149e1d0a212bec4275d700f262c62aec842633222141ba862293cd118c143819fdf0050ee0dfb4e656f1e60b5533114c78757d562a704cfc1e29622e2c6b6a02129d4c71808bd6dbe03020952d31234fe36bbecea2fca736262d6f3593b7ef44964c9baec19891d469520c5acc33137fa6a01bd666eda67a7cb1501ea342caa41bf3f6f712c89a533ccdb8cc63bc3e1b0e7cbdfe4b32b12f57252d96b120d17ce247e4ac7b87f3e8a32a21065535d03ae9bbc1c0f2ae0ec0dd743f690f34fa1e0a4cddfebf50044d9 public exponent: 10001 ]