2021-05-12 00:20:41,235 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-12 00:20:45,437 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-12 00:20:48.427  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-12 00:21:01.041 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-12 00:21:02.241  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-12 00:21:03.039  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-12 00:21:18.532  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 39.892 seconds (JVM running for 47.537) 2021-05-12 00:38:29.140  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-12 00:38:29.236 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-12 00:38:29.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-12 00:38:29.429 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 00:38:29.527  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-12 00:38:29.531  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 00:38:29.536  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-12 00:38:29.537  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 00:38:29.538  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-12 00:38:29.624  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-12 00:38:29.629  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-12 00:38:29.827  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-12 00:38:29.835  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 00:38:29.836  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 00:38:29.939  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 00:38:31.436  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-12 00:38:31.439  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-12 00:38:31.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-12 00:38:31.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-12 00:38:31.527  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1311 2021-05-12 00:38:31.529  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-12 00:38:31.535  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 00:38:31.536  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-12 00:38:31.542  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-12 00:38:31.543  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-12 00:38:31.544 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 00:38:31.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 00:38:31.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 00:38:31.637 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 00:38:31.638 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 00:38:31.638 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 00:38:31.644 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 00:38:31.827 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2a:25:45:42:0d:ec:a4:8f:57:3f:54:ee:9b:c5:8c:c6:02:10:26:90] modulus: 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 public exponent: 10001 ] 2021-05-12 02:12:00.741  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-12 02:12:00.743 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-12 02:12:00.745 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-12 02:12:00.746 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 02:12:00.747  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-12 02:12:00.748  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 02:12:00.748  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-12 02:12:00.749  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-12 02:12:00.749  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-12 02:12:00.833  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-12 02:12:00.834  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 02:12:00.835  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 02:12:00.838  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 02:12:01.099  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-12 02:12:01.100  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-12 02:12:01.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-12 02:12:01.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-12 02:12:01.105  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1311 2021-05-12 02:12:01.105  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-12 02:12:01.107  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 02:12:01.108  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-12 02:12:01.108  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-12 02:12:01.109  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-12 02:12:01.109 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:12:01.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:12:01.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:12:01.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:12:01.112 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:12:01.124 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:12:01.126 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 02:12:01.132 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: d0e344f93d186ad62aaa5168957c0d63f639420c063232e7602d5b52942008cb0395443e5c94eea002df6f5223ec85a34f1e436724c40507c254fba16981b025e08517e334fef1b0f486130dad5ea833470213ff752df4274c62d6ea9f7c1806ad4d821c838dd3a737fc4588c5c0e94067d3d9839a32ed9a927fabf188fde18142522c8bd34f4626b7cb71c4057a6f1b194bc69c55fedb2efeea98da42fb40640d18a7f2375f1cd6ede700d7764cd13a2616f80827cd2d0dd9718f7898d723e0dc265ec5858e16c32d9d43c30d57fcf54541711e4c86720ea07f48aae096e4366fb3a69b735aa913ab4e34ad3d80edc715fda955a777b7cd7ab09d6940614609f8c4fb97643b69a5f87f2a91e5f56577900a0727d035e2c486fa3c31681732fd06e29296968feae8698f1240926751dd846784bcb9652b6620914973a2a520b56b8ebe5204955f71116d082a2a943509bd609e64031a64cd78f034d3f62013d13b5308bea033b34db47137135ec05863ffe8539d1b46fb43033c924f109942d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:cf:ee:a6:0f:89:30:64:bb:3c:55:98:cf:ef:a5:7b:8e:f0:62:0b] modulus: 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 public exponent: 10001 ] 2021-05-12 02:12:37.009  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-12 02:12:37.010 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-12 02:12:37.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-12 02:12:37.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 02:12:37.014  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-12 02:12:37.014  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 02:12:37.015  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-12 02:12:37.019  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-12 02:12:37.021  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-12 02:12:37.033  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-12 02:12:37.034  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 02:12:37.034  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 02:12:37.035  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 02:12:37.257  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-12 02:12:37.258  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-12 02:12:37.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-12 02:12:37.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-12 02:12:37.324  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1311 2021-05-12 02:12:37.326  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-12 02:12:37.328  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 02:12:37.329  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-12 02:12:37.331  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-12 02:12:37.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-12 02:12:37.333 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:12:37.333 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:12:37.333 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:12:37.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:12:37.335 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:12:37.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:12:37.337 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 02:12:37.340 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:bb:2e:e1:ee:b7:91:26:d2:a3:b2:28:5f:e6:53:d9:9c:fc:29:22] modulus: 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 public exponent: 10001 ] 2021-05-12 02:16:23.338  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-12 02:16:23.340 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-12 02:16:23.342 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-12 02:16:23.343 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 02:16:23.343  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-12 02:16:23.344  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 02:16:23.344  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-12 02:16:23.345  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-12 02:16:23.345  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-12 02:16:23.352  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-12 02:16:23.353  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 02:16:23.353  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 02:16:23.355  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 02:16:23.548  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-12 02:16:23.549  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-12 02:16:23.549 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-12 02:16:23.556 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-12 02:16:23.558  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1311 2021-05-12 02:16:23.558  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-12 02:16:23.560  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 02:16:23.561  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-12 02:16:23.561  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-12 02:16:23.562  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-12 02:16:23.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:16:23.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:16:23.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:16:23.564 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:16:23.565 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:16:23.566 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:16:23.567 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 02:16:23.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:fb:38:10:5e:4e:b6:52:70:1d:b8:a8:fe:fa:64:85:5e:b6:d6:d8] modulus: b4cedbd52e0bb529b2aae6d83c89293cd2b4823159e72cfb32cbbc52b62db0e97dea279a232e52015d28e9cb59dc22de08a9f245ca9dbde54bceef69965e7ee1278d4ed13c7002fd45817c9abf2f5bdc197e9c3e3d95b85f964aacbff8f88cc6f0e196af871ca6e3d963cbf4b30daf33d82da004f74b01af365f662d0bc44d36ad56a1739a3938db11d435fd616680681e7579d936950ab173696c24446231412c4c74ba2c2229937c555a235bf617cd02cac2cd88d11d5cbcba61bfbe31973b031b3cf41538616b066fd94a2ec70fe8f587d05b97be3d42d04c2084df0a2a3e6d46e783090bfbfa1f4231ab0d7f4d103aac4827c6e5057f9fc1ac230213d49b public exponent: 10001 ] 2021-05-12 02:20:20.721  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-12 02:20:20.722 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-12 02:20:20.724 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-12 02:20:20.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 02:20:20.725  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-12 02:20:20.726  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 02:20:20.727  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-12 02:20:20.727  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-12 02:20:20.728  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-12 02:20:20.734  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-12 02:20:20.735  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 02:20:20.735  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 02:20:20.737  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 02:20:20.922  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-12 02:20:20.923  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-12 02:20:20.923 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-12 02:20:20.925 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-12 02:20:20.926  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1311 2021-05-12 02:20:20.926  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-12 02:20:20.928  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 02:20:20.928  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-12 02:20:20.929  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-12 02:20:20.929  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-12 02:20:20.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:20:20.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:20:20.930 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:20:20.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:20:20.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:20:20.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:20:20.933 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 02:20:20.937 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [22:1c:e2:da:dc:a3:d3:c6:75:bc:9e:cf:17:9c:37:85:0d:bd:83:67] modulus: 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 public exponent: 10001 ] 2021-05-12 02:23:52.128  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-12 02:23:52.130 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-12 02:23:52.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-12 02:23:52.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-12 02:23:52.134  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-12 02:23:52.137  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-12 02:23:52.138  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-12 02:23:52.138  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-12 02:23:52.139  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-12 02:23:52.144  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-12 02:23:52.144  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 02:23:52.145  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-12 02:23:52.146  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-12 02:23:52.337  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-12 02:23:52.337  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-12 02:23:52.338 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-12 02:23:52.339 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-12 02:23:52.340  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1311 2021-05-12 02:23:52.340  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-12 02:23:52.342  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-12 02:23:52.342  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-12 02:23:52.343  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-12 02:23:52.343  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-12 02:23:52.343 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:23:52.344 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:23:52.344 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:23:52.345 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-12 02:23:52.346 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-12 02:23:52.346 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-12 02:23:52.347 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-12 02:23:52.350 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 38435135415726566066386537680795255031147991883 IssuerDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed May 12 00:16:16 UTC 2021 Final Date: Mon May 12 00:16:16 UTC 2031 SubjectDN: UID=c-0d5217ef181b76055,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5d:ba:9a:7c:88:ae:c3:a7:f2:a0:25:98:df:dd:01:03:93:8e:6f:68] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ba3151784e2c373ee75055d97b9f59c5a82a7bf4 9ef8356bca754f2bd60e3d0d0ebf24c4d374f533 7b26eedb7d341c7dcbf8b88eabaf641e09cda2c2 75231be56e33b9e1045d18267031babf1d7dde91 bf3f3a5e0785e7198c8acae77da04680c11ce0b2 9b04d0c09ad712247bd54a91548600e32fdd934c cc39bf5aa899db5f123ee44346a8712dada3cf0f f407bdbffbd0f01e1d09402e42e61b8728c59ea3 87227f243665e8239c706fe2dd019489ef9eef51 d1faf7d4f0b5fed47537e338ace93ec345ff478f bdf718f2260899b90b56ee614abf6cfc9d8481ee 0a46539cecb8e243358581467fc4e391e15fa2e5 534c3dab4f0527f326ffefdc54f5c6e315848540 9d86f8c888b8f0078ecf970c9d4661458f1cdd99 0efd0e6f6274c491b838826719086d0241638812 90bc3b6f558347e4666edd485d128ce900ae39a7 9874584003f114a486fce52d945f8ae1c11966de 404023af704eab1cfe912c6564dc911e6a9a0242 8a59a358a13d8f3ba04fe8963dd6a32fa4b1a666 c8c9abe7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [78:20:67:0a:11:f3:8f:05:a8:6d:bf:73:09:d5:6c:43:3e:35:c8:28] modulus: 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 public exponent: 10001 ]