2021-05-03 00:05:22,458 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-03 00:05:25,957 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-03 00:05:28.477  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-03 00:05:38.466 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-03 00:05:39.375  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-03 00:05:39.968  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-03 00:05:52.065  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 31.6 seconds (JVM running for 37.799) 2021-05-03 00:14:55.059  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 00:14:55.068 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 00:14:55.166 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-03 00:14:55.170 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 00:14:55.253  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-03 00:14:55.256  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 00:14:55.261  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 00:14:55.262  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 00:14:55.262  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 00:14:55.269  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 00:14:55.272  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 00:14:55.454  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 00:14:55.461  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 00:14:55.462  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 00:14:55.554  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 00:14:56.660  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 00:14:57.355  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 00:14:57.356 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 00:14:57.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 00:14:57.363  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 00:14:57.363  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 00:14:57.451  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 00:14:57.453  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 00:14:57.458  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 00:14:57.459  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 00:14:57.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 00:14:57.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 00:14:57.461 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 00:14:57.471 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 00:14:57.472 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 00:14:57.472 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 00:14:57.556 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 00:14:57.664 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:d2:46:f9:7b:6e:3c:3e:23:4a:0e:48:dc:9c:fb:92:3f:b6:4c:79] modulus: 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 public exponent: 10001 ] 2021-05-03 01:14:51.258  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:14:51.260 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:14:51.262 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 01:14:51.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:14:51.264  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 01:14:51.264  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:14:51.265  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:14:51.265  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:14:51.266  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:14:51.275  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:14:51.276  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:14:51.276  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:14:51.353  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:14:51.525  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:14:51.525  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:14:51.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:14:51.529 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:14:51.530  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:14:51.530  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:14:51.532  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:14:51.533  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:14:51.533  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:14:51.534  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:14:51.534 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:14:51.535 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:14:51.535 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:14:51.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:14:51.537 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:14:51.537 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:14:51.538 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:14:51.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:1a:28:2a:4d:4e:67:9f:15:d6:a7:5e:89:40:8b:16:3b:f2:f7:23] modulus: 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 public exponent: 10001 ] 2021-05-03 01:16:04.099  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:16:04.100 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:16:04.102 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-03 01:16:04.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:16:04.103  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-03 01:16:04.104  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:16:04.105  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:16:04.105  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:16:04.106  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:16:04.111  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:16:04.111  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:16:04.112  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:16:04.114  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:16:04.230  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:16:04.231  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:16:04.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:16:04.232 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:16:04.233  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:16:04.233  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:16:04.252  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:16:04.253  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:16:04.254  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:16:04.254  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:16:04.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:16:04.255 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:16:04.255 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:16:04.256 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:16:04.257 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:16:04.257 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:16:04.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:16:04.261 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:c0:08:d1:8e:df:6e:b9:0d:ae:69:5a:ea:97:e1:e4:a9:eb:1b:a4] modulus: 871d52fd6e0b1be6b008d4bd87aa181468ff17231cc58db032700af7d4ce81e7c19dd414d4ae0f36ff8f71fb0c2100d658a3239ff94f94a68c24821aa7324edf2d14a525c62631c96d6642ccc2ef59bd27545c71c0fb53685a1ca226931d9f3fec3d2dffa516a3036ea29fc39493eebac35ab1a997c5c4aa6f1bec002a6ec492baf3ee9efdd5afcc9a985cd4dde6d6a85ffb7b2f3c7fcb67f4524ab5a92ef0fab0a77235ce2cd3c0af9a117c63f0ec2b187a1fbfc54699412542f86fd0b077a913d0f18c6e1216b5bf6bb6aae14270c73fdf30886a62bb4f0dc88bc6564c899c996ef57abf8aed56950e21ceb500da4fecb87a3bfeebf9db8ecce3b8f3aad319 public exponent: 10001 ] 2021-05-03 01:18:38.948  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:18:38.949 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:18:38.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-03 01:18:38.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:18:38.951  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-03 01:18:38.952  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:18:38.952  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:18:38.953  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:18:38.953  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:18:38.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:18:38.959  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:18:38.959  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:18:38.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:18:39.051  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:18:39.052  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:18:39.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:18:39.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:18:39.054  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:18:39.054  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:18:39.055  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:18:39.056  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:18:39.056  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:18:39.056  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:18:39.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:18:39.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:18:39.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:18:39.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:18:39.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:18:39.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:18:39.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:18:39.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:03:27:30:0e:d3:a6:a8:f6:9a:ac:9c:df:85:e3:2f:76:10:b4:b1] modulus: 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 public exponent: 10001 ] 2021-05-03 01:19:01.959  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:19:01.960 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:19:01.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-03 01:19:01.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:19:01.962  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-03 01:19:01.963  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:19:01.964  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:19:01.964  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:19:01.965  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:19:01.969  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:19:01.969  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:19:01.969  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:19:01.971  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:19:02.084  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:19:02.085  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:19:02.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:19:02.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:19:02.087  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:19:02.087  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:19:02.088  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:19:02.088  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:19:02.089  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:19:02.089  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:19:02.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:19:02.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:19:02.151 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:19:02.152 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:19:02.153 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:19:02.153 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:19:02.154 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:19:02.156 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:60:95:d8:48:fa:d4:2c:3e:b2:f5:36:83:60:5d:ef:84:50:8d:80] modulus: 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 public exponent: 10001 ] 2021-05-03 01:19:49.035  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:19:49.035 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:19:49.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-03 01:19:49.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:19:49.037  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-03 01:19:49.038  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:19:49.038  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:19:49.039  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:19:49.039  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:19:49.043  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:19:49.044  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:19:49.044  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:19:49.052  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:19:49.157  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:19:49.158  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:19:49.158 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:19:49.160 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:19:49.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:19:49.161  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:19:49.162  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:19:49.162  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:19:49.163  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:19:49.163  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:19:49.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:19:49.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:19:49.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:19:49.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:19:49.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:19:49.166 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:19:49.167 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:19:49.169 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:bb:c0:93:f6:34:be:48:0d:80:4a:c3:80:7d:a9:10:f1:df:3b:a7] modulus: 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 public exponent: 10001 ] 2021-05-03 01:20:40.206  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:20:40.207 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:20:40.208 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-03 01:20:40.209 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:20:40.209  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-03 01:20:40.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:20:40.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:20:40.211  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:20:40.211  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:20:40.215  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:20:40.216  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:20:40.216  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:20:40.217  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:20:40.325  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:20:40.326  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:20:40.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:20:40.353 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:20:40.353  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:20:40.354  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:20:40.354  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:20:40.355  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:20:40.355  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:20:40.356  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:20:40.356 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:20:40.356 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:20:40.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:20:40.358 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:20:40.358 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:20:40.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:20:40.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:20:40.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: b87f63b62b9e1cd5375059c1b28998dc72aacbcfd05af696ce52c70915ad5ce1e82881c2850650efcde1b3812701033b6efcc6c89783b9623bc89adc7d6118f9f9224d71e333d73bf557812078c761352ed89aa66e5bbe95f7af89ce00b374cf971c1e6885089a55f2f78865517c4a4f494dd232b09c88e9558224266a8fc1664115ee6776de2eabaf1567d05ee22b513a8109e6c1c6882e299e2ae3cc06af74533940ff0e6287410131f446c9a08e4c876def0315baef9a47e8f751feeefffa5121be70730474ce7ce795e8acaba47a6b888d571aa91777b7c16ac4ee41c7a130ab9df30ff959cc2c7de8893f56136fc4ec7c7d967a28e8008d1997e0a0f1ed640a3ab0cd656399912d8e06439a9b0355392d8f7aa94bc58007853ef9ee26334e979e446ffafc0862725262ff8c0b8f8de15f4951664c93f0f5b5844d29b44b2c3c0a50b514a6d6e247b6d85a8f378569ef6fe33ecd5241cf8655a4ed880c654b868e6b371d210a1126479a57c828a9812e4c7c73ae3f2f0006ed7714e93429 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b1:3b:19:08:5a:58:a9:a8:45:55:47:75:05:56:25:10:e7:57:6e:eb] modulus: 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 public exponent: 10001 ] 2021-05-03 01:20:51.272  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:20:51.273 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:20:51.275 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-03 01:20:51.275 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:20:51.276  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-03 01:20:51.277  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:20:51.277  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:20:51.278  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:20:51.279  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:20:51.283  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:20:51.284  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:20:51.285  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:20:51.351  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:20:51.442  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:20:51.443  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:20:51.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:20:51.445 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:20:51.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:20:51.446  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:20:51.448  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:20:51.449  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:20:51.449  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:20:51.450  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:20:51.450 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:20:51.451 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:20:51.451 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:20:51.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:20:51.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:20:51.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:20:51.454 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:20:51.457 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:7b:53:23:7c:48:38:1d:5f:4e:fa:3e:db:5c:0e:0e:3d:e3:2e:23] modulus: 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 public exponent: 10001 ] 2021-05-03 01:22:10.411  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:22:10.412 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:22:10.414 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-03 01:22:10.414 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:22:10.415  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-03 01:22:10.415  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:22:10.416  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:22:10.416  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:22:10.416  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:22:10.422  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:22:10.423  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:22:10.423  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:22:10.424  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:22:10.516  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:22:10.517  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:22:10.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:22:10.519 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:22:10.519  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:22:10.519  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:22:10.520  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:22:10.521  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:22:10.521  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:22:10.522  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:22:10.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:22:10.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:22:10.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:22:10.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:22:10.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:22:10.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:22:10.525 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:22:10.527 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:a8:8a:e1:13:80:b0:ac:bb:3e:c4:00:56:ee:bf:c6:9f:f2:1e:2f] modulus: 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 public exponent: 10001 ] 2021-05-03 01:24:41.742  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:24:41.743 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:24:41.744 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 01:24:41.744 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:24:41.745  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 01:24:41.745  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:24:41.745  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:24:41.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:24:41.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:24:41.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:24:41.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:24:41.751  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:24:41.751  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:24:41.871  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:24:41.872  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:24:41.872 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:24:41.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:24:41.873  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:24:41.874  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:24:41.875  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:24:41.875  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:24:41.875  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:24:41.876  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:24:41.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:24:41.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:24:41.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:24:41.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:24:41.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:24:41.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:24:41.878 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:24:41.880 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:9d:e4:5e:72:57:46:8b:37:ff:be:ea:a4:97:dd:df:5b:44:ad:3e] modulus: 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 public exponent: 10001 ] 2021-05-03 01:27:04.685  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:27:04.686 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:27:04.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 01:27:04.687 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:27:04.688  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 01:27:04.688  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:27:04.688  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:27:04.689  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:27:04.689  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:27:04.693  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:27:04.693  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:27:04.694  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:27:04.695  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:27:04.781  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:27:04.781  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:27:04.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:27:04.783 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:27:04.783  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:27:04.783  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:27:04.784  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:27:04.784  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:27:04.785  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:27:04.785  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:27:04.785 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:27:04.785 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:27:04.786 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:27:04.786 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:27:04.786 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:27:04.786 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:27:04.787 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:27:04.789 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:67:da:92:45:87:b0:66:49:72:e3:09:80:a0:75:be:5f:12:71:01] modulus: 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 public exponent: 10001 ] 2021-05-03 01:28:52.738  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:28:52.738 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:28:52.739 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 01:28:52.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:28:52.740  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 01:28:52.740  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:28:52.741  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:28:52.741  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:28:52.741  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:28:52.745  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:28:52.746  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:28:52.746  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:28:52.747  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:28:52.853  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:28:52.854  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:28:52.854 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:28:52.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:28:52.855  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:28:52.856  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:28:52.857  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:28:52.857  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:28:52.857  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:28:52.857  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:28:52.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:28:52.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:28:52.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:28:52.859 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:28:52.859 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:28:52.859 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:28:52.860 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:28:52.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: b87f63b62b9e1cd5375059c1b28998dc72aacbcfd05af696ce52c70915ad5ce1e82881c2850650efcde1b3812701033b6efcc6c89783b9623bc89adc7d6118f9f9224d71e333d73bf557812078c761352ed89aa66e5bbe95f7af89ce00b374cf971c1e6885089a55f2f78865517c4a4f494dd232b09c88e9558224266a8fc1664115ee6776de2eabaf1567d05ee22b513a8109e6c1c6882e299e2ae3cc06af74533940ff0e6287410131f446c9a08e4c876def0315baef9a47e8f751feeefffa5121be70730474ce7ce795e8acaba47a6b888d571aa91777b7c16ac4ee41c7a130ab9df30ff959cc2c7de8893f56136fc4ec7c7d967a28e8008d1997e0a0f1ed640a3ab0cd656399912d8e06439a9b0355392d8f7aa94bc58007853ef9ee26334e979e446ffafc0862725262ff8c0b8f8de15f4951664c93f0f5b5844d29b44b2c3c0a50b514a6d6e247b6d85a8f378569ef6fe33ecd5241cf8655a4ed880c654b868e6b371d210a1126479a57c828a9812e4c7c73ae3f2f0006ed7714e93429 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:af:1d:43:4d:47:65:11:24:14:1e:0b:bd:f5:13:d9:73:89:4e:2f] modulus: 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 public exponent: 10001 ] 2021-05-03 01:30:15.588  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-03 01:30:15.589 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-03 01:30:15.590 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 01:30:15.590 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-03 01:30:15.590  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-03 01:30:15.591  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-03 01:30:15.591  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-03 01:30:15.591  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-03 01:30:15.592  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-03 01:30:15.595  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-03 01:30:15.596  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:30:15.596  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-03 01:30:15.597  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-03 01:30:15.725  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-03 01:30:15.725  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-03 01:30:15.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-03 01:30:15.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-03 01:30:15.727  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1137 2021-05-03 01:30:15.727  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-03 01:30:15.728  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-03 01:30:15.728  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-03 01:30:15.729  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-03 01:30:15.729  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-03 01:30:15.729 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:30:15.730 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:30:15.730 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:30:15.730 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-03 01:30:15.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-03 01:30:15.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-03 01:30:15.731 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-03 01:30:15.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 720588005049565143527549852225106608821723198649 IssuerDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon May 03 00:00:04 UTC 2021 Final Date: Sat May 03 00:00:04 UTC 2031 SubjectDN: UID=c-006af7cdf0272ce9a,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:1f:33:92:b0:85:c8:ad:0c:1e:46:9d:b3:5a:e2:e0:6c:de:11:1c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 54f52974198bed45af8dfbe9bc667a06ddf475df 7fd0cd0a4cdd80ef4d82c2572afe29a9d31d283f 26d74e66e52d6854996178695fefaaf67d342af9 1385605d88aba342c8cf936cf6a07621400a969d 9c65c8bab28d44b2fcba32bdbd550dab9f86a549 ae79ca1ee430ca5a16d890b8bb60ee117630afde afd6250e6102fe18dc51142704cec778e3c0f20d 06b8b3276d5f712e8e0bc50b806597c234319173 bb9e3f395fbda4abd083ebff0f87c4306727b44c 1b694ff9b67666b1e6e29310be8f1e4452c76939 1ae197ec0a28f20c327de47dffe869d16cd3c4f3 657a476160eb0d422d0a82a646f604734273d99c 674b4f16da88fbc9e55d9b8d97c644bf1db0fda9 4e91bcff9ec47c82f629abda141e9971b62890c7 6333d091b96ba39c24b81ba7e40a15856b40056f eaa8b5acf260ae2cabf65b5390a3a4954c64c5cf eaed828412b52e92dffd8e56365175f72032dac1 f103ae0fcc7fcfbb74d9ecab02455a7e48d8c485 8035e192961fbe12d3fc21c2565279467c58cc80 526228f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:f7:29:47:c6:14:e7:d2:9f:3b:dd:fb:cd:3b:a9:07:ec:35:a7:1a] modulus: 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 public exponent: 10001 ]