2021-05-22 23:30:27,051 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-22 23:30:31,037 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-22 23:30:34.241  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-22 23:30:46.350 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-22 23:30:47.449  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-22 23:30:48.338  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-22 23:31:02.950  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 37.902 seconds (JVM running for 45.083) 2021-05-22 23:45:11.052  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-22 23:45:11.147 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-22 23:45:11.346 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-22 23:45:11.350 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-22 23:45:11.534  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-22 23:45:11.540  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-22 23:45:11.545  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-22 23:45:11.545  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-22 23:45:11.546  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-22 23:45:11.551  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-22 23:45:11.554  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-22 23:45:11.743  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-22 23:45:11.750  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-22 23:45:11.750  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-22 23:45:11.842  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-22 23:45:13.247  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-22 23:45:13.249  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-22 23:45:13.250 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-22 23:45:13.338 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-22 23:45:13.339  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-22 23:45:13.340  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-22 23:45:13.344  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-22 23:45:13.345  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-22 23:45:13.350  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-22 23:45:13.435  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-22 23:45:13.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-22 23:45:13.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-22 23:45:13.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-22 23:45:13.534 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-22 23:45:13.535 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-22 23:45:13.536 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-22 23:45:13.548 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-22 23:45:13.649 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [96:0e:01:60:18:a6:ea:02:fa:44:40:45:e9:0c:77:9d:bf:ae:e5:b5] modulus: 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 public exponent: 10001 ] 2021-05-23 01:10:16.985  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:10:16.988 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:10:16.989 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-23 01:10:16.990 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:10:16.991  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-23 01:10:16.991  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:10:16.992  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:10:16.992  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:10:16.993  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:10:16.998  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:10:16.999  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:10:16.999  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:10:17.002  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:10:17.177  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:10:17.178  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:10:17.179 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:10:17.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:10:17.184  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:10:17.185  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:10:17.186  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:10:17.234  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:10:17.235  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:10:17.236  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:10:17.237 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:10:17.237 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:10:17.238 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:10:17.240 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:10:17.241 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:10:17.242 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:10:17.244 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:10:17.249 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:9e:af:94:b8:25:99:12:7f:96:88:56:3f:76:dd:2b:b7:3c:89:5b] modulus: 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 public exponent: 10001 ] 2021-05-23 01:12:26.501  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:12:26.503 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:12:26.504 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-23 01:12:26.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:12:26.505  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-23 01:12:26.506  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:12:26.507  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:12:26.507  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:12:26.508  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:12:26.516  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:12:26.517  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:12:26.518  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:12:26.519  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:12:26.626  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:12:26.635  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:12:26.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:12:26.640 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:12:26.642  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:12:26.643  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:12:26.645  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:12:26.645  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:12:26.647  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:12:26.647  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:12:26.652 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:12:26.653 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:12:26.653 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:12:26.734 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:12:26.735 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:12:26.735 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:12:26.736 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:12:26.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:6a:e5:09:26:e5:c7:c2:5b:22:bb:be:36:80:45:16:da:c3:d4:6a] modulus: 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 public exponent: 10001 ] 2021-05-23 01:15:49.762  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:15:49.763 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:15:49.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-23 01:15:49.765 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:15:49.766  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-23 01:15:49.766  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:15:49.767  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:15:49.767  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:15:49.767  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:15:49.772  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:15:49.773  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:15:49.773  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:15:49.774  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:15:49.946  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:15:49.947  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:15:49.948 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:15:49.949 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:15:49.949  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:15:49.949  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:15:49.951  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:15:49.951  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:15:49.952  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:15:49.952  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:15:49.952 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:15:49.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:15:49.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:15:49.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:15:49.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:15:49.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:15:49.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:15:49.958 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:3c:97:c4:e7:c5:b4:7a:2f:01:0a:34:43:c0:5c:27:2c:74:1a:43] modulus: 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 public exponent: 10001 ] 2021-05-23 01:15:50.961  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:15:50.962 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:15:50.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-23 01:15:50.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:15:50.964  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-23 01:15:50.964  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:15:50.965  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:15:50.965  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:15:50.965  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:15:50.969  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:15:50.969  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:15:50.969  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:15:50.971  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:15:51.030  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:15:51.034  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:15:51.034 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:15:51.036 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:15:51.036  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:15:51.037  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:15:51.038  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:15:51.039  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:15:51.039  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:15:51.040  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:15:51.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:15:51.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:15:51.041 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:15:51.041 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:15:51.042 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:15:51.042 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:15:51.043 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:15:51.045 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:60:9d:77:03:46:3e:68:9d:3c:51:4d:26:1a:9b:b4:3e:e4:e1:1a] modulus: 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 public exponent: 10001 ] 2021-05-23 01:16:02.411  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:16:02.413 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:16:02.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-23 01:16:02.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:16:02.415  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-23 01:16:02.415  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:16:02.415  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:16:02.416  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:16:02.416  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:16:02.421  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:16:02.422  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:16:02.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:16:02.424  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:16:02.507  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:16:02.508  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:16:02.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:16:02.510 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:16:02.510  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:16:02.511  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:16:02.513  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:16:02.513  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:16:02.513  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:16:02.514  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:16:02.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:16:02.514 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:16:02.534 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:16:02.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:16:02.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:16:02.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:16:02.538 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:16:02.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:b7:a0:4b:00:14:b4:a9:04:8e:a6:5c:ae:f7:64:04:0a:4f:0e:a9] modulus: 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 public exponent: 10001 ] 2021-05-23 01:16:12.070  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:16:12.072 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:16:12.074 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-23 01:16:12.074 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:16:12.075  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-23 01:16:12.076  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:16:12.076  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:16:12.076  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:16:12.077  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:16:12.080  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:16:12.081  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:16:12.081  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:16:12.082  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:16:12.150  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:16:12.151  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:16:12.151 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:16:12.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:16:12.153  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:16:12.154  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:16:12.155  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:16:12.155  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:16:12.155  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:16:12.156  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:16:12.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:16:12.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:16:12.157 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:16:12.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:16:12.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:16:12.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:16:12.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:16:12.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:1e:28:03:3b:ae:16:8d:84:83:56:e4:bc:6c:c0:70:45:b9:0e:fb] modulus: 8b90e0689d743793cb57ee0e743c0fa53495e45ecd26bbe989172a97c0d38555b52ccb59bc4b9d4b4f5676b8c049043970b1a7b0c2309da59b88cc0544a400943540220d2df5c594644dfb56b879e5dd3e440a8670de1b4f2207935477184e9fe58466de7e7e9314cd30b39f1ae08ef46f306d6e0513d6c93f78e64749cfcb4073fdfdc65abaa062a86dcb9a549bf3f94a22dce314c1ce5736d66977ff743f4aed970956bef261876412d2a7a7e4916f73df8b876e2fd6dfec79595a798cf2c1362e243503f5efad0a7ec6d81f5e40337dc3eb21c3bda634127019f1b282f9269e69d5a3960c1832da40d1eafc9c24470ceccbae90ef19cd02e868b6e59f7639 public exponent: 10001 ] 2021-05-23 01:18:15.379  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:18:15.380 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:18:15.380 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-23 01:18:15.381 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:18:15.381  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-23 01:18:15.381  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:18:15.381  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:18:15.382  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:18:15.382  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:18:15.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:18:15.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:18:15.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:18:15.387  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:18:15.486  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:18:15.487  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:18:15.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:18:15.489 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:18:15.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:18:15.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:18:15.492  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:18:15.493  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:18:15.494  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:18:15.494  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:18:15.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:18:15.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:18:15.534 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:18:15.535 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:18:15.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:18:15.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:18:15.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:18:15.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:19:13:06:19:f1:d4:6d:5b:ef:35:c0:35:ab:69:c8:78:50:97:c0] modulus: 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 public exponent: 10001 ] 2021-05-23 01:18:36.067  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:18:36.068 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:18:36.070 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-23 01:18:36.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:18:36.072  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-23 01:18:36.072  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:18:36.073  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:18:36.073  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:18:36.073  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:18:36.077  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:18:36.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:18:36.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:18:36.079  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:18:36.141  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:18:36.141  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:18:36.142 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:18:36.143 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:18:36.143  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:18:36.144  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:18:36.145  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:18:36.145  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:18:36.145  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:18:36.145  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:18:36.146 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:18:36.146 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:18:36.146 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:18:36.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:18:36.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:18:36.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:18:36.148 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:18:36.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:2b:1d:68:97:41:71:85:b8:fe:73:88:4f:28:32:c7:51:2e:1e:63] modulus: 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 public exponent: 10001 ] 2021-05-23 01:23:04.028  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:23:04.030 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:23:04.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-23 01:23:04.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:23:04.034  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-23 01:23:04.034  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:23:04.035  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:23:04.035  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:23:04.035  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:23:04.039  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:23:04.039  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:23:04.039  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:23:04.040  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:23:04.123  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:23:04.124  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:23:04.124 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:23:04.126 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:23:04.127  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:23:04.128  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:23:04.134  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:23:04.134  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:23:04.135  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:23:04.135  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:23:04.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:23:04.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:23:04.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:23:04.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:23:04.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:23:04.136 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:23:04.137 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:23:04.140 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:41:9d:fd:d4:31:12:c7:77:64:cc:97:38:b8:a0:cc:57:2d:de:b4] modulus: 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 public exponent: 10001 ] 2021-05-23 01:26:40.620  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:26:40.623 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:26:40.624 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-23 01:26:40.625 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:26:40.625  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-23 01:26:40.626  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:26:40.627  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:26:40.627  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:26:40.628  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:26:40.633  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:26:40.634  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:26:40.634  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:26:40.635  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:26:40.720  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:26:40.721  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:26:40.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:26:40.735 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:26:40.736  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:26:40.736  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:26:40.738  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:26:40.739  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:26:40.739  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:26:40.740  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:26:40.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:26:40.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:26:40.741 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:26:40.741 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:26:40.741 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:26:40.742 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:26:40.742 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:26:40.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:a9:de:1e:25:53:dc:13:9a:96:80:85:a0:31:c3:14:90:b6:9c:dc] modulus: 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 public exponent: 10001 ] 2021-05-23 01:28:25.434  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:28:25.435 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:28:25.436 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-23 01:28:25.436 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:28:25.436  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-23 01:28:25.436  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:28:25.437  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:28:25.437  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:28:25.437  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:28:25.440  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:28:25.441  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:28:25.441  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:28:25.442  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:28:25.540  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:28:25.540  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:28:25.540 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:28:25.541 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:28:25.542  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:28:25.542  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:28:25.543  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:28:25.543  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:28:25.543  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:28:25.543  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:28:25.543 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:28:25.544 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:28:25.544 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:28:25.544 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:28:25.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:28:25.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:28:25.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:28:25.547 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fc:c5:91:1d:b4:03:61:c9:2b:17:69:51:2f:25:e0:16:16:d2:8c:31] modulus: 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 public exponent: 10001 ] 2021-05-23 01:30:07.627  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-23 01:30:07.628 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-23 01:30:07.629 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-23 01:30:07.629 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-23 01:30:07.629  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-23 01:30:07.630  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-23 01:30:07.630  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-23 01:30:07.630  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-23 01:30:07.631  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-23 01:30:07.634  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-23 01:30:07.634  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:30:07.635  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-23 01:30:07.636  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-23 01:30:07.710  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-23 01:30:07.711  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-23 01:30:07.712 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-23 01:30:07.714 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-23 01:30:07.715  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1626 2021-05-23 01:30:07.715  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-23 01:30:07.717  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-23 01:30:07.718  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-23 01:30:07.718  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-23 01:30:07.718  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-23 01:30:07.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:30:07.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:30:07.719 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:30:07.719 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-23 01:30:07.719 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-23 01:30:07.719 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-23 01:30:07.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-23 01:30:07.734 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 506206799124146646413640664177449792612630780434 IssuerDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 22 23:21:06 UTC 2021 Final Date: Thu May 22 23:21:06 UTC 2031 SubjectDN: UID=c-097f974f29a05e1e7,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1a:e9:65:6b:e6:6d:df:1c:fc:35:04:5b:b3:3e:7b:f7:4d:86:fc:66] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2ad72d9d636e1c12519321d50f51b77cd9e9317e 1e666837ed5a1a9cf9ff28da009e37f84395beb0 09a758013bf13e4fa3be059da8875937e5228a80 f6a947e3b7742956302729bea1d478e151a09e58 8d61c31abb3b18fbf3a6083e4f0338d23916bc41 5c359875bebd939fc7082c9186df347ca8e8f980 a648c23a4db04e914db8f69f482fd0a232d433bb 61360cb7b64e43fba176ee38113187ba3da7bd12 5f10f51fe32c2603a08744b0ace426ddfb85d82d b9ebb4a110278e781009ae9d059907c724e1fbd3 a93e92d523aa138632318b4f3d0f3f8817132843 497cf7a73b7447e899956b626b6b8348c6742346 d1c0aa9b516f39d6a5455c3fc3220ceef0f44752 9fc995e79149af69d043670e237a823adfcf99ce 8bf10cf25875ddd91096962c7b49c97962a307a2 65cbc7e89a4174bf5406c2134969786c032e3940 9817dfc0fb5af7b1e683594f308117b45978cd42 d95aad82e1f8f4f4e214878a25646098fc01487c 1a84c8eb31a8abc280b1b7efa9b730caf4f5b1be 7d80aef8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:33:24:17:b0:f3:51:dd:3a:2d:08:cc:75:df:e6:73:78:a5:a8:83] modulus: 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 public exponent: 10001 ]