2021-06-10 06:32:47,763 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-06-10 06:32:52,160 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-06-10 06:32:55.166  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-06-10 06:33:07.680 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-06-10 06:33:09.062  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-06-10 06:33:09.874  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-06-10 06:33:25.971  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 40.801 seconds (JVM running for 48.923) 2021-06-10 08:19:48.875  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:19:48.968 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:19:49.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-10 08:19:49.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:19:49.161  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-10 08:19:49.165  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:19:49.170  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:19:49.171  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:19:49.171  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:19:49.263  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:19:49.266  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:19:49.377  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:19:49.462  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:19:49.463  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:19:49.658  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:19:51.066  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:19:51.071  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:19:51.156 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:19:51.162 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:19:51.164  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:19:51.165  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:19:51.259  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:19:51.261  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:19:51.271  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:19:51.357  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:19:51.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:19:51.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:19:51.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:19:51.465 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:19:51.466 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:19:51.466 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:19:51.564 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:19:51.868 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: b51c3f70135600efa7f3da4d7a8616bb544ed847226d72e03bc8b7cbfad5f21d49945d774b4ca44ff4a6f8c170de9309dc296a82d58385dc161c70d54fbff1f48efcf7c750e038a80bbe0d816ec4f700adad747e3b52d6bf8fd111250e282953f75e28bcc06a5dfb4ac5ad86383e6efa6dc8fd005e2205ca2fb9e6d3d28481fdd6436005a3d07944fc32d40c7a2a455d080d6c8f33b2cf447f060015eb7f5bc1f36119062451afe00d451613770a29c60681159bfaa283dcfde4be8368c3fb02ca4df8b783085e71b14045b3cb59447f823b8bf2536a90f6052979444b2330a64785784d3d8f729e3c48f90d0c88a0e2f84a4c16a821bc881c0e3ee1374cdc31489bce3065f175ed894de69da7f0c9ca37c651eff94bb1b18152f07d706587ffaa8ac47ca2f997407fe67e3050d4c1f5f9810cc83989f690e32478de50e4704c8b14fee9a6252d464cbde851e26de33b7c4ebd16538b3105e22cf2cb60bb0b074cc744f44adf90e7e0f4ec5fb7516058284f6e71efe7dc12e7b95ee0ec1d6bdb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:0f:31:33:40:f3:8d:33:70:f4:bc:cf:21:a0:48:3e:d0:34:0c:89] modulus: 93e43bae6c5be08f8f1a8a0b01ab613465caece1bf3bcdd947922664028fc959a4708606d580d4983a1103718b0963ef5dbb984b636b5ba5c42e405c7aa0da2967b6c14ae70bd5c8cefd5993950ea35fea1fd0ae9ee7dc530c6e89208cced282163114e813f3a199feffa20e268339431f156162bd69e11da9ab1b7617d98395a9e76bae1c13a1fd7053c6f6b85098bec8605f28652d93e28d6bb8860f6b65d85692622b0827694a3bea274a1271e3747a799d10692c053d973bb7e91a6c7cc13ecc5dca2dfca5d0a7caa389551d286270e009e4772e1fc674d8d5a43ccfe060001307615338e03dc0561ec8e1ea0bb1fb9b36697a89b02385c8ed5b5bcac627 public exponent: 10001 ] 2021-06-10 08:20:54.647  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:20:54.648 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:20:54.650 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-06-10 08:20:54.651 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:20:54.652  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-06-10 08:20:54.652  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:20:54.653  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:20:54.653  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:20:54.654  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:20:54.662  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:20:54.663  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:20:54.663  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:20:54.666  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:20:54.758  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:20:54.759  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:20:54.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:20:54.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:20:54.765  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:20:54.766  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:20:54.771  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:20:54.772  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:20:54.773  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:20:54.774  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:20:54.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:20:54.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:20:54.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:20:54.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:20:54.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:20:54.778 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:20:54.856 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:20:54.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6d:24:e9:47:38:eb:e7:b1:d4:ae:21:6d:51:19:d2:a6:e0:a7:5d:05] modulus: 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 public exponent: 10001 ] 2021-06-10 08:24:26.388  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:24:26.390 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:24:26.391 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-10 08:24:26.392 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:24:26.393  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-10 08:24:26.394  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:24:26.394  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:24:26.395  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:24:26.395  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:24:26.456  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:24:26.457  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:24:26.458  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:24:26.459  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:24:26.531  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:24:26.556  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:24:26.556 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:24:26.563 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:24:26.564  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:24:26.565  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:24:26.568  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:24:26.569  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:24:26.569  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:24:26.570  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:24:26.571 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:24:26.572 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:24:26.572 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:24:26.573 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:24:26.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:24:26.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:24:26.575 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:24:26.578 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: b51c3f70135600efa7f3da4d7a8616bb544ed847226d72e03bc8b7cbfad5f21d49945d774b4ca44ff4a6f8c170de9309dc296a82d58385dc161c70d54fbff1f48efcf7c750e038a80bbe0d816ec4f700adad747e3b52d6bf8fd111250e282953f75e28bcc06a5dfb4ac5ad86383e6efa6dc8fd005e2205ca2fb9e6d3d28481fdd6436005a3d07944fc32d40c7a2a455d080d6c8f33b2cf447f060015eb7f5bc1f36119062451afe00d451613770a29c60681159bfaa283dcfde4be8368c3fb02ca4df8b783085e71b14045b3cb59447f823b8bf2536a90f6052979444b2330a64785784d3d8f729e3c48f90d0c88a0e2f84a4c16a821bc881c0e3ee1374cdc31489bce3065f175ed894de69da7f0c9ca37c651eff94bb1b18152f07d706587ffaa8ac47ca2f997407fe67e3050d4c1f5f9810cc83989f690e32478de50e4704c8b14fee9a6252d464cbde851e26de33b7c4ebd16538b3105e22cf2cb60bb0b074cc744f44adf90e7e0f4ec5fb7516058284f6e71efe7dc12e7b95ee0ec1d6bdb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2d:4b:e4:dc:99:f8:c7:de:b1:8e:63:e0:05:af:65:9f:e4:ea:4b:c3] modulus: 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 public exponent: 10001 ] 2021-06-10 08:24:31.985  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:24:31.987 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:24:31.988 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-10 08:24:31.988 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:24:32.055  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-06-10 08:24:32.057  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:24:32.057  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:24:32.059  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:24:32.060  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:24:32.157  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:24:32.158  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:24:32.158  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:24:32.161  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:24:32.217  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:24:32.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:24:32.218 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:24:32.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:24:32.256  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:24:32.257  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:24:32.259  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:24:32.260  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:24:32.261  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:24:32.261  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:24:32.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:24:32.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:24:32.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:24:32.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:24:32.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:24:32.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:24:32.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:24:32.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: b51c3f70135600efa7f3da4d7a8616bb544ed847226d72e03bc8b7cbfad5f21d49945d774b4ca44ff4a6f8c170de9309dc296a82d58385dc161c70d54fbff1f48efcf7c750e038a80bbe0d816ec4f700adad747e3b52d6bf8fd111250e282953f75e28bcc06a5dfb4ac5ad86383e6efa6dc8fd005e2205ca2fb9e6d3d28481fdd6436005a3d07944fc32d40c7a2a455d080d6c8f33b2cf447f060015eb7f5bc1f36119062451afe00d451613770a29c60681159bfaa283dcfde4be8368c3fb02ca4df8b783085e71b14045b3cb59447f823b8bf2536a90f6052979444b2330a64785784d3d8f729e3c48f90d0c88a0e2f84a4c16a821bc881c0e3ee1374cdc31489bce3065f175ed894de69da7f0c9ca37c651eff94bb1b18152f07d706587ffaa8ac47ca2f997407fe67e3050d4c1f5f9810cc83989f690e32478de50e4704c8b14fee9a6252d464cbde851e26de33b7c4ebd16538b3105e22cf2cb60bb0b074cc744f44adf90e7e0f4ec5fb7516058284f6e71efe7dc12e7b95ee0ec1d6bdb public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:71:8c:26:20:dc:c9:c5:06:1c:66:df:1b:93:35:9b:99:a8:61:89] modulus: 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 public exponent: 10001 ] 2021-06-10 08:25:16.750  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:25:16.751 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:25:16.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-06-10 08:25:16.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:25:16.753  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-06-10 08:25:16.754  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:25:16.754  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:25:16.755  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:25:16.755  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:25:16.760  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:25:16.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:25:16.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:25:16.763  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:25:16.842  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:25:16.843  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:25:16.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:25:16.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:25:16.857  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:25:16.857  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:25:16.859  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:25:16.859  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:25:16.860  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:25:16.860  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:25:16.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:25:16.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:25:16.861 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:25:16.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:25:16.862 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:25:16.863 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:25:16.864 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:25:16.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:81:7d:85:72:60:97:3d:af:d5:17:a7:aa:d8:17:4c:dc:16:72:16] modulus: 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 public exponent: 10001 ] 2021-06-10 08:25:37.706  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:25:37.707 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:25:37.709 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-06-10 08:25:37.710 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:25:37.710  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-06-10 08:25:37.711  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:25:37.711  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:25:37.712  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:25:37.712  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:25:37.718  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:25:37.718  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:25:37.719  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:25:37.720  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:25:37.831  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:25:37.855  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:25:37.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:25:37.858 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:25:37.859  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:25:37.860  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:25:37.862  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:25:37.862  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:25:37.863  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:25:37.863  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:25:37.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:25:37.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:25:37.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:25:37.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:25:37.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:25:37.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:25:37.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:25:37.869 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fb:b5:ea:3a:42:d0:1b:5f:1a:a1:b5:07:27:82:cd:bf:4e:23:db:4b] modulus: 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 public exponent: 10001 ] 2021-06-10 08:26:46.960  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:26:46.961 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:26:46.963 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-06-10 08:26:46.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:26:46.964  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-06-10 08:26:46.965  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:26:46.965  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:26:46.966  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:26:46.966  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:26:46.970  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:26:46.970  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:26:46.971  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:26:46.972  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:26:47.056  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:26:47.058  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:26:47.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:26:47.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:26:47.061  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:26:47.062  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:26:47.064  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:26:47.065  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:26:47.065  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:26:47.066  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:26:47.068 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:26:47.068 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:26:47.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:26:47.070 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:26:47.070 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:26:47.071 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:26:47.072 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:26:47.075 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:4d:70:89:32:de:a1:81:cc:11:91:4b:fc:16:15:b8:c5:82:b8:1a] modulus: 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 public exponent: 10001 ] 2021-06-10 08:28:08.201  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:28:08.203 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:28:08.204 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-06-10 08:28:08.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:28:08.205  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-06-10 08:28:08.206  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:28:08.207  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:28:08.207  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:28:08.207  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:28:08.214  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:28:08.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:28:08.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:28:08.217  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:28:08.322  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:28:08.323  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:28:08.323 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:28:08.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:28:08.325  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:28:08.325  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:28:08.327  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:28:08.328  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:28:08.328  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:28:08.328  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:28:08.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:28:08.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:28:08.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:28:08.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:28:08.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:28:08.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:28:08.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:28:08.359 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:94:9c:f4:cc:b9:75:b2:a6:af:50:a3:fb:3c:36:fb:e6:8b:e7:f1] modulus: 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 public exponent: 10001 ] 2021-06-10 08:30:54.339  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:30:54.340 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:30:54.341 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-10 08:30:54.342 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:30:54.342  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-10 08:30:54.343  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:30:54.343  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:30:54.343  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:30:54.343  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:30:54.348  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:30:54.348  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:30:54.349  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:30:54.350  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:30:54.421  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:30:54.422  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:30:54.423 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:30:54.425 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:30:54.426  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:30:54.426  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:30:54.429  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:30:54.430  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:30:54.430  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:30:54.430  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:30:54.431 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:30:54.431 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:30:54.432 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:30:54.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:30:54.457 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:30:54.457 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:30:54.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:30:54.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:78:4f:97:ef:56:a4:b3:2d:94:36:95:19:a6:f4:5f:bb:09:71:83] modulus: 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 public exponent: 10001 ] 2021-06-10 08:33:30.324  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:33:30.326 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:33:30.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-10 08:33:30.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:33:30.328  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-10 08:33:30.328  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:33:30.328  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:33:30.329  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:33:30.329  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:33:30.333  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:33:30.334  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:33:30.334  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:33:30.335  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:33:30.414  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:33:30.414  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:33:30.415 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:33:30.416 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:33:30.416  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:33:30.417  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:33:30.418  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:33:30.418  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:33:30.419  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:33:30.419  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:33:30.419 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:33:30.420 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:33:30.420 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:33:30.421 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:33:30.421 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:33:30.421 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:33:30.422 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:33:30.424 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:9d:5b:4f:cd:9c:d7:20:89:c6:6c:b7:ff:63:b8:23:a8:60:96:cc] modulus: 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 public exponent: 10001 ] 2021-06-10 08:35:14.456  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:35:14.458 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:35:14.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-10 08:35:14.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:35:14.460  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-10 08:35:14.460  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:35:14.461  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:35:14.461  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:35:14.462  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:35:14.465  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:35:14.466  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:35:14.466  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:35:14.467  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:35:14.545  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:35:14.546  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:35:14.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:35:14.548 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:35:14.555  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:35:14.556  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:35:14.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:35:14.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:35:14.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:35:14.559  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:35:14.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:35:14.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:35:14.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:35:14.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:35:14.561 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:35:14.561 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:35:14.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:35:14.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6b:4b:9c:59:a5:e0:b9:dc:ef:86:d3:8b:bd:35:bf:44:41:73:27:b3] modulus: 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 public exponent: 10001 ] 2021-06-10 08:36:42.731  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-06-10 08:36:42.732 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-06-10 08:36:42.733 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-10 08:36:42.734 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-06-10 08:36:42.735  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-06-10 08:36:42.736  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-06-10 08:36:42.736  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-06-10 08:36:42.736  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-06-10 08:36:42.737  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-06-10 08:36:42.744  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-06-10 08:36:42.744  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:36:42.745  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-06-10 08:36:42.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-06-10 08:36:42.830  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-06-10 08:36:42.831  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-06-10 08:36:42.831 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-06-10 08:36:42.832 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-06-10 08:36:42.833  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1889 2021-06-10 08:36:42.833  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-06-10 08:36:42.834  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-06-10 08:36:42.835  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-06-10 08:36:42.835  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-06-10 08:36:42.835  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-06-10 08:36:42.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:36:42.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:36:42.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:36:42.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-06-10 08:36:42.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-06-10 08:36:42.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-06-10 08:36:42.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart 2021-06-10 08:36:42.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 440937770874861271596360299380760053078128245265 IssuerDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 09 23:09:43 UTC 2021 Final Date: Mon Jun 09 23:09:43 UTC 2031 SubjectDN: UID=c-0c18d2507ee3ac49f,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [4c:ac:2a:a7:27:67:6e:bb:1d:71:5a:46:37:c8:06:d1:e2:ec:55:5c] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1a3b703b27e282c53bb035ee7f74112af09816b4 2f8504cd71be7575ab7104344e2d36f851e39e40 482d1092c0c853edc37637ce5439b1eaffe2bffa cb70c002053afc45f786517e3d4d974bbe39e920 d9c93c4402e986182301d2934c4a976a0a55b00a 8d9fa9a27ace635fb41aeaef363343b77ce50046 afb2c0e65503522d7827ce7cbf4b1637242397a3 ce0e5859fc6991d5fa8df95531ea25e78ff03d9f 56446ce30d6b5b4c9aa881fc2b3eae2359c9de63 7af5baa98ba57347eaac7f1b8e3e16235f15f8c8 064e1ff827f101e7adf03e4f831832736f20c2b0 30610371e280d5d0c8d828a58ba818583efa765a 35264d6b63c896cedc58a1e7af7f0b7bf0650d54 57e04a48ddd57266fb9c880938fc493b7471d99a bb96119b157f71fae6f2321e10a3b72d2015bd20 4d93988fa3a818a6b426822c4671db7145f0c7e3 7febfe28ee92840485c9de9c5d561131dc062c1c 01573a4fc6fe13bfabb757ac26e94899e2859b7a dccf13af7522efae87b0267908e0f5478bebf44a faccfb25 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [55:b5:95:1b:5c:72:95:75:b6:b1:42:94:c8:c6:18:36:d9:0a:31:e7] modulus: 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 public exponent: 10001 ]