2021-07-05 23:18:25,858 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-07-05 23:18:29,370 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-07-05 23:18:32.155  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-07-05 23:18:43.157 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-07-05 23:18:44.166  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-07-05 23:18:44.957  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-07-05 23:18:57.066  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 33.207 seconds (JVM running for 39.569) 2021-07-05 23:37:02.750  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-05 23:37:02.760 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-05 23:37:02.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-07-05 23:37:02.855 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-05 23:37:02.868  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-07-05 23:37:02.870  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-05 23:37:02.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-05 23:37:02.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-05 23:37:02.952  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-05 23:37:02.959  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-05 23:37:02.962  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-05 23:37:03.153  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-05 23:37:03.159  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-05 23:37:03.159  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-05 23:37:03.252  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-05 23:37:04.755  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-05 23:37:04.758  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-05 23:37:04.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-05 23:37:04.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-05 23:37:04.765  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-05 23:37:04.765  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-05 23:37:04.768  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-05 23:37:04.769  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-05 23:37:04.855  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-05 23:37:04.856  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-05 23:37:04.857 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-05 23:37:04.857 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-05 23:37:04.858 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-05 23:37:04.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-05 23:37:04.956 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-05 23:37:04.956 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-05 23:37:04.963 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-05 23:37:05.061 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:53:da:35:28:a6:0a:1c:bc:81:d8:e9:60:15:61:6b:d9:58:d5:1a] modulus: bb3299916ca7dc12ea0b76aedd37a68e395da0c14d9e6448dd85162ba03db580bfb902baa5122756ce887faa9716c755128fe0ea03673b4ce43104a00d30240c5a8e9f872af2701bed05d412139f10d9218d2b108134422d1d7d60472dcdea4370acfaf7d2e38f6aef64284f4dea793a820009138ac870173a3140ee4795e53d65e69cc459b2c5aefc24c0d91e08e8fb51208a9cd4213e6410cb05ed55361bc35c5ef1adb99d7f9a891de86eeb0a421e119c11fe4830b324aae80ee3ac8d83419090c191b520c089563f9778504543ab3d0dc7d09c28d6d52790e9be3429789f2d946a880e2936b3bbd6827291fdfc1e0179fb564ae1e9b0a08260004bc4d1af public exponent: 10001 ] 2021-07-06 00:55:22.565  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 00:55:22.567 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 00:55:22.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-06 00:55:22.569 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 00:55:22.570  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-06 00:55:22.571  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 00:55:22.571  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 00:55:22.572  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 00:55:22.572  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 00:55:22.650  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 00:55:22.651  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 00:55:22.651  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 00:55:22.653  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 00:55:22.791  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 00:55:22.792  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 00:55:22.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 00:55:22.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 00:55:22.796  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 00:55:22.796  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 00:55:22.798  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 00:55:22.798  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 00:55:22.799  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 00:55:22.799  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 00:55:22.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 00:55:22.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 00:55:22.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 00:55:22.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 00:55:22.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 00:55:22.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 00:55:22.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 00:55:22.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:f7:90:73:fd:49:5d:f7:be:0d:e1:c2:6e:f0:6e:31:de:3f:72:bd] modulus: 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 public exponent: 10001 ] 2021-07-06 00:56:39.245  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 00:56:39.247 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 00:56:39.248 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-06 00:56:39.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 00:56:39.250  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-06 00:56:39.251  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 00:56:39.251  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 00:56:39.252  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 00:56:39.253  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 00:56:39.259  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 00:56:39.259  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 00:56:39.260  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 00:56:39.261  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 00:56:39.387  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 00:56:39.388  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 00:56:39.388 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 00:56:39.390 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 00:56:39.391  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 00:56:39.391  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 00:56:39.393  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 00:56:39.393  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 00:56:39.394  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 00:56:39.394  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 00:56:39.394 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 00:56:39.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 00:56:39.396 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 00:56:39.396 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 00:56:39.397 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 00:56:39.397 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 00:56:39.449 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 00:56:39.453 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: b126924645fd3a1c18be64bfe8abf39c7d4df5b97ca1a06923934f8f9cbab51410304da46b4b387b7c89f67de46e1fcc88456035a652e1bf301ae18362dffab82b379f4c71e82ee59b8d51f795fd695e64ba454da605f4a2c656b16910674ed66639eb81fa14e4d246a11059c5d3d80e8a3113e68dd0483e74035129a78f387e4d37bc31f62655604e30ee9e4a50befce512d2215d188ffd5349f527d322db537049136f4482c4ff881543e147af14de4c707b5b925287ba670236e922f2bdc9423ed8fa24b081b0aa548b8e7d4bb77fcd2ea9c30e2b868c2deec5e71ae7295cbced9240afabc73cec3cc0289257af4724c47faaf48c3520e463c75165b8d5d2314ae78d21ecd03396cf2bd7a96e3b542f6150ba8ad76fb416f5126aa9794089914e2a2015f2ca4523014522dec55d6808d711a038aa091fb7dd242ed218b294c1e575d35d36ba4dabc6931d06963a872a35c6d09cb897dffb3e9ab95b7b7af7e9c1a62446778014a0b6bd587949c374b34f265509931fd94ffa408953bb83c7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:66:af:85:02:33:00:d2:84:b7:6b:01:6e:80:84:c2:b3:d9:2f:24] modulus: 81cb652303b13c66748f49d5310307b0b714248a555ba8b0abc2b65d44a9645ae2431328cc1732449c7b19e4215781807ddbb1e46cd2b4dd03ade935a050a7a64e26de2af2fc3cebf6ec6acbd4aed1e9c26f5fc55d90f6dd3412a43da95d009b4a400b56bc817d04c398a7099452b327a578271f35378d694ecb4cc5531071c6a1eef9df05ca9dcaf6059763d7e54175e4c1bb1950630f63b2b0ffbbb55ac24637ee5c435e5444d31ae055d516e79c575a7b68825631f519af2fd84a9ecae2f0f0e754be5f81fe274671436032e814034eca8c566dfe58b2659b57e988a84325c1f5b057d97b6d9bea530bb9cda1addaaa71f14fce1a070c827be60802e998fb public exponent: 10001 ] 2021-07-06 01:00:17.454  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:00:17.455 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:00:17.457 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-06 01:00:17.457 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:00:17.458  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-06 01:00:17.458  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:00:17.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:00:17.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:00:17.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:00:17.467  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:00:17.467  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:00:17.468  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:00:17.469  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:00:18.477  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:00:18.478  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:00:18.479 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:00:18.481 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:00:18.481  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:00:18.482  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:00:18.483  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:00:18.484  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:00:18.484  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:00:18.485  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:00:18.485 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:00:18.486 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:00:18.486 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:00:18.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:00:18.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:00:18.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:00:18.488 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:00:18.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:7b:5b:33:12:ee:2a:28:5c:93:28:07:79:5b:f7:46:60:78:e4:4f] modulus: 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 public exponent: 10001 ] 2021-07-06 01:00:28.626  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:00:28.627 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:00:28.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-06 01:00:28.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:00:28.630  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-06 01:00:28.630  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:00:28.631  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:00:28.631  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:00:28.632  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:00:28.636  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:00:28.637  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:00:28.637  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:00:28.638  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:00:28.771  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:00:28.771  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:00:28.772 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:00:28.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:00:28.773  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:00:28.774  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:00:28.775  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:00:28.775  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:00:28.775  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:00:28.776  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:00:28.776 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:00:28.776 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:00:28.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:00:28.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:00:28.778 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:00:28.778 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:00:28.779 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:00:28.781 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:a1:fd:97:12:d2:80:c8:b1:ee:0e:16:cb:65:b8:b2:a2:86:fc:bd] modulus: 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 public exponent: 10001 ] 2021-07-06 01:01:27.288  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:01:27.295 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:01:27.295 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-07-06 01:01:27.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:01:27.297  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-07-06 01:01:27.297  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:01:27.298  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:01:27.298  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:01:27.299  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:01:27.303  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:01:27.304  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:01:27.304  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:01:27.305  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:01:27.466  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:01:27.467  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:01:27.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:01:27.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:01:27.469  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:01:27.469  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:01:27.470  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:01:27.470  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:01:27.471  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:01:27.471  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:01:27.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:01:27.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:01:27.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:01:27.473 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:01:27.473 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:01:27.473 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:01:27.474 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:01:27.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:ca:0b:a0:24:5d:b9:23:cb:e5:1c:a1:88:65:5e:81:58:26:de:7c] modulus: 8a4b030058c6d82ce5f3c1a9526d99cc73204c8a2160ffd255a7dfc77dd69edacb8f5ab11a3c3ad5e55d93f48584ac1b0b2bd1160610c8af03986c6331ca592ab310e1080f2c523d03c9d6b178e2c64c4a28132058e50f6552bfd37225062ae3a0f00aadd30dcd1e51506ec3a087eb77d93988c11c13b5d36fdabf50924a81d2b630f1f412351812d7a027bf0ab4733db85c7d50bb465779d0d5299b1ff3a96897279551ed9fba445cf4b3cfc15e04ac5e0c5190a86adfd5439300a04e4ba6f3972ecc7b335322b7f2e93895f5d0127f046d8965e124437f9ebdbb0928499891bda821a5ae1f2378e69aba97d9467fa51be2da834fb0f9ca85abd40c06e20261 public exponent: 10001 ] 2021-07-06 01:01:28.657  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:01:28.658 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:01:28.662 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-07-06 01:01:28.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:01:28.663  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-07-06 01:01:28.664  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:01:28.664  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:01:28.664  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:01:28.664  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:01:28.669  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:01:28.669  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:01:28.669  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:01:28.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:01:28.732  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:01:28.732  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:01:28.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:01:28.750 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:01:28.750  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:01:28.750  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:01:28.751  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:01:28.752  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:01:28.752  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:01:28.752  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:01:28.753 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:01:28.753 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:01:28.753 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:01:28.754 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:01:28.754 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:01:28.755 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:01:28.755 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:01:28.758 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:5e:fd:8a:57:13:27:69:df:72:4a:85:19:83:5e:23:5d:d2:30:46] modulus: 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 public exponent: 10001 ] 2021-07-06 01:02:37.552  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:02:37.553 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:02:37.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-06 01:02:37.555 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:02:37.555  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-06 01:02:37.556  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:02:37.556  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:02:37.556  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:02:37.557  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:02:37.561  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:02:37.561  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:02:37.561  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:02:37.563  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:02:37.667  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:02:37.668  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:02:37.668 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:02:37.669 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:02:37.670  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:02:37.670  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:02:37.672  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:02:37.673  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:02:37.673  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:02:37.673  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:02:37.674 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:02:37.674 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:02:37.674 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:02:37.675 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:02:37.675 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:02:37.675 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:02:37.676 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:02:37.751 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [88:d9:5f:90:96:f6:09:ce:cd:7b:97:d5:96:54:8e:01:8d:f4:5a:5e] modulus: 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 public exponent: 10001 ] 2021-07-06 01:03:48.536  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:03:48.538 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:03:48.539 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-06 01:03:48.539 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:03:48.540  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-06 01:03:48.540  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:03:48.541  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:03:48.541  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:03:48.541  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:03:48.545  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:03:48.546  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:03:48.546  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:03:48.547  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:03:48.658  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:03:48.659  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:03:48.659 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:03:48.662 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:03:48.662  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:03:48.663  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:03:48.665  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:03:48.666  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:03:48.667  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:03:48.667  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:03:48.668 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:03:48.668 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:03:48.669 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:03:48.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:03:48.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:03:48.670 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:03:48.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:03:48.677 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0f:89:b1:c4:b8:95:8a:a9:5e:4e:7b:aa:eb:19:fd:3c:92:b8:36:9b] modulus: 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 public exponent: 10001 ] 2021-07-06 01:05:27.894  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:05:27.896 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:05:27.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-06 01:05:27.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:05:27.898  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-06 01:05:27.898  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:05:27.898  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:05:27.899  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:05:27.899  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:05:27.903  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:05:27.904  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:05:27.905  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:05:27.907  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:05:28.029  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:05:28.029  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:05:28.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:05:28.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:05:28.031  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:05:28.031  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:05:28.032  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:05:28.033  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:05:28.033  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:05:28.033  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:05:28.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:05:28.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:05:28.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:05:28.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:05:28.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:05:28.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:05:28.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:05:28.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:a2:fe:0c:f1:29:54:eb:a8:81:8d:ed:64:71:99:1c:9f:80:a9:cd] modulus: 8413dbc2ca0ba5479bcd7517f03f1961280388f931cd5658ccd63fbb012bb8b8f1b9494f888e464f07bd225d32423dfeac7db46cf71410682004acda3eac4be22aa0d7f681a3aa46a24db6d630ef9098fd910cc53c876f098607a09a873fadb74e4c7d4477d04dd7a226ce184a8fc2f023f81228f14954e7758326d61effd3b73cdb39e1daf234eaf8b4f31356dce70ce9168d8bc09c7e207c8b02ae2ff58971a6894b40414dd478975df53b6054909aab48086765e63dc2dfb4ca2ee28a50a165f0a344832834de01b6b3325c2b842fb1cffd30264cfc85f82fbfc1e5619235464c16e46afe5f91b863eba546bc2aa62176148f9d9c6645d687a88d631ced2b public exponent: 10001 ] 2021-07-06 01:07:48.038  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:07:48.040 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:07:48.042 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-06 01:07:48.043 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:07:48.043  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-06 01:07:48.044  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:07:48.045  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:07:48.045  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:07:48.046  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:07:48.054  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:07:48.055  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:07:48.055  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:07:48.057  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:07:48.160  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:07:48.160  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:07:48.161 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:07:48.162 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:07:48.162  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:07:48.162  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:07:48.163  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:07:48.163  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:07:48.164  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:07:48.164  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:07:48.164 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:07:48.164 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:07:48.164 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:07:48.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:07:48.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:07:48.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:07:48.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:07:48.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [49:39:ec:85:a0:08:75:65:56:a7:39:d2:b2:86:38:c2:30:05:ac:81] modulus: 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 public exponent: 10001 ] 2021-07-06 01:08:09.661  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:08:09.662 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:08:09.663 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-06 01:08:09.664 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:08:09.664  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-06 01:08:09.665  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:08:09.665  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:08:09.665  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:08:09.665  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:08:09.669  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:08:09.670  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:08:09.670  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:08:09.671  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:08:09.765  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:08:09.766  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:08:09.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:08:09.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:08:09.767  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:08:09.768  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:08:09.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:08:09.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:08:09.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:08:09.770  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:08:09.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:08:09.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:08:09.771 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:08:09.771 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:08:09.771 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:08:09.772 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:08:09.773 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:08:09.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:8c:e7:ad:82:d9:5d:3a:96:dd:07:bd:38:8b:8d:27:d2:b8:88:6e] modulus: a37d0c3242d46245d3669184078ce02c23d651d09bc84b634e178dcbf7904c53241ed513a6108ae0868e1153451b5eefe8215a058c783c78e5c35076c89e72071080f6a464033c77a55134132c8242249f759d463916d0686c1c9f7ee917e6b583afc3a5dccf41b12e9f3040ffd6600006eecc30d2b1053a17d49f26f1842ba8e6bd5c552fed0970e8c9d9ff2816aa03e9282845976afe6a5cd476d5ad7c8164af63eb6acd69438df5ebd62992c44b72379f8bf444edf453f0e5eaa207e46b10c10a17a1eefa7c5f422fc68e20c1505e6c875378dfe9c4a34c5cbcdaf6300fb85f8b2c7886d19d32269a8f5794d792af8957c8c4b3cbb67a4adaeac679d5cd73 public exponent: 10001 ] 2021-07-06 01:09:30.787  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:09:30.788 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:09:30.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-06 01:09:30.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:09:30.790  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-06 01:09:30.790  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:09:30.790  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:09:30.791  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:09:30.791  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:09:30.795  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:09:30.795  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:09:30.798  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:09:30.799  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:09:30.919  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:09:30.919  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:09:30.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:09:30.921 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:09:30.922  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:09:30.922  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:09:30.923  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:09:30.924  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:09:30.924  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:09:30.924  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:09:30.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:09:30.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:09:30.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:09:30.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:09:30.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:09:30.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:09:30.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:09:30.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:98:fe:1d:cf:48:e5:a3:9f:0c:2b:36:3d:61:74:3f:7d:24:86:47] modulus: 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 public exponent: 10001 ] 2021-07-06 01:10:17.851  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:10:17.852 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:10:17.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-06 01:10:17.853 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:10:17.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-06 01:10:17.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:10:17.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:10:17.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:10:17.855  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:10:17.859  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:10:17.859  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:10:17.859  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:10:17.860  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:10:17.960  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:10:17.960  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:10:17.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:10:17.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:10:17.962  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:10:17.962  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:10:17.963  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:10:17.964  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:10:17.964  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:10:17.964  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:10:17.964 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:10:17.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:10:17.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:10:17.965 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:10:17.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:10:17.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:10:17.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:10:17.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: b126924645fd3a1c18be64bfe8abf39c7d4df5b97ca1a06923934f8f9cbab51410304da46b4b387b7c89f67de46e1fcc88456035a652e1bf301ae18362dffab82b379f4c71e82ee59b8d51f795fd695e64ba454da605f4a2c656b16910674ed66639eb81fa14e4d246a11059c5d3d80e8a3113e68dd0483e74035129a78f387e4d37bc31f62655604e30ee9e4a50befce512d2215d188ffd5349f527d322db537049136f4482c4ff881543e147af14de4c707b5b925287ba670236e922f2bdc9423ed8fa24b081b0aa548b8e7d4bb77fcd2ea9c30e2b868c2deec5e71ae7295cbced9240afabc73cec3cc0289257af4724c47faaf48c3520e463c75165b8d5d2314ae78d21ecd03396cf2bd7a96e3b542f6150ba8ad76fb416f5126aa9794089914e2a2015f2ca4523014522dec55d6808d711a038aa091fb7dd242ed218b294c1e575d35d36ba4dabc6931d06963a872a35c6d09cb897dffb3e9ab95b7b7af7e9c1a62446778014a0b6bd587949c374b34f265509931fd94ffa408953bb83c7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:f5:9d:fc:05:f1:66:08:67:cf:6e:44:02:9c:f8:41:62:5b:c8:64] modulus: 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 public exponent: 10001 ] 2021-07-06 01:11:15.201  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:11:15.202 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:11:15.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-06 01:11:15.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:11:15.203  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-06 01:11:15.204  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:11:15.204  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:11:15.204  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:11:15.204  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:11:15.208  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:11:15.209  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:11:15.209  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:11:15.210  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:11:15.307  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:11:15.308  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:11:15.308 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:11:15.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:11:15.309  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:11:15.310  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:11:15.311  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:11:15.311  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:11:15.311  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:11:15.311  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:11:15.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:11:15.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:11:15.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:11:15.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:11:15.312 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:11:15.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:11:15.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:11:15.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:19:4d:1f:a0:ef:da:47:02:48:22:9d:a3:f1:7b:16:90:9a:50:5c] modulus: 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 public exponent: 10001 ] 2021-07-06 01:11:54.063  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-06 01:11:54.063 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-06 01:11:54.064 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-06 01:11:54.064 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-06 01:11:54.065  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-06 01:11:54.065  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-06 01:11:54.065  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-06 01:11:54.065  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-06 01:11:54.066  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-06 01:11:54.069  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-06 01:11:54.069  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:11:54.070  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-06 01:11:54.071  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-06 01:11:54.193  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-06 01:11:54.194  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-06 01:11:54.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-06 01:11:54.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-06 01:11:54.195  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1667 2021-07-06 01:11:54.195  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-06 01:11:54.196  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-06 01:11:54.197  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-06 01:11:54.197  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-06 01:11:54.197  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-06 01:11:54.197 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:11:54.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:11:54.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:11:54.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-06 01:11:54.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-06 01:11:54.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-06 01:11:54.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-06 01:11:54.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 508027288713060720396019050360778401285082033243 IssuerDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jul 05 23:11:58 UTC 2021 Final Date: Sat Jul 05 23:11:58 UTC 2031 SubjectDN: UID=c-06ee14d4eb906b529,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [35:3c:03:0b:8c:23:36:59:58:a7:9e:18:ba:ae:4c:0d:d4:1c:24:da] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16ed89ed0c676a1445a7c90c1dcc4b65feb39270 4cbdc0a45b5de55ea7dcec6e2861887a0491c1b4 a267f452f89e7508c1878040fb27292685b174c6 bb09c3f841c6117a6c96fa27d0f3fc008ec3fa74 a5732ca0b04aa84291c54c09e780b070e5e5a9f3 6bdf5f5b13c66789811c4c0726501060893d8519 1c1c02bcace0a7fd48a45c825a11ecfb1716b34e 1881ea87f08e232705211044ff47f2de26508127 85884f5bc52eb98188b352e073896e92184e8274 06a87775b4ff9a66dfe1e88518a8de2a443109f8 6404605059826d9aaa9f1e11e4e16d6ec39596ce 10f3b2809de2b6f6964e112c1a2be87c4c4fa772 725229cec3a6e1bcdc78564ec554daaee54086da 0f8f1ea403f1ba2423b26e6a8f10349ed515e5be 3a2b45f1df0436e67e7d70f4c9bdff857f9cc6b5 9e166005e9d7a2111f4486fa293f21222c406035 11e6de70f79117fdb87c931b1f27796123e294e2 7992a82159a895b93735e8c265f2ae6197bfc75a 811abbffe6ca93a8225165e767a5761ba02ad616 0902cbcc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [33:2f:b1:ec:11:a7:78:07:dd:97:56:a6:3b:ad:71:ee:46:86:30:f9] modulus: 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 public exponent: 10001 ]