2021-07-07 06:46:00,102 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-07-07 06:46:04,106 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-07-07 06:46:07.299  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-07-07 06:46:19.305 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-07-07 06:46:20.509  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-07-07 06:46:21.118  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-07-07 06:46:35.508  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 38.094 seconds (JVM running for 45.383) 2021-07-07 06:57:25.907  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 06:57:25.995 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 06:57:26.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-07-07 06:57:26.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 06:57:26.207  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-07-07 06:57:26.211  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 06:57:26.300  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 06:57:26.300  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 06:57:26.301  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 06:57:26.308  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 06:57:26.311  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 06:57:26.500  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 06:57:26.507  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 06:57:26.508  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 06:57:26.605  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 06:57:27.768  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 06:57:27.772  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 06:57:27.773 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 06:57:27.796 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 06:57:27.798  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 06:57:27.799  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 06:57:27.804  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 06:57:27.804  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 06:57:27.810  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 06:57:27.811  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 06:57:27.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 06:57:27.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 06:57:27.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 06:57:27.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 06:57:27.902 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 06:57:27.902 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 06:57:27.910 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 06:57:28.016 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:29:3f:de:b2:3a:07:d8:0a:d7:dd:38:18:7f:a8:11:68:ce:61:af] modulus: a768abb97f1ded20e4ba0849468d64ffcb7193d9a50360426aef616313b81ac629315ec87e30b4497800edb81a629d7e8c92303588eadebdf8f8f7696df5e2852f5a2e6f9ee4fb099ea90e5f8e504fe729c3c3e98e0c3295d0d266e0a6d49680873b28444e7634349045ded4210b68b828c7f5db88073f2c07685bc665b1d8de6c8645532c1cf066eddec0ae4dabff1799ea1bfdfc35b9926a82901db5c90661b6e2884caf5ac5488a9eaed5d73da5b3ea3f5d747b34330ba2a8193e388136acb46b7b50cad8276fee46e94e9fe1a010db613c3769cf2b460185607b1c1eba8845c14075f39ffaa336acfb426c3f331178aba7533151ff33a11531197624772b public exponent: 10001 ] 2021-07-07 08:30:00.386  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:30:00.389 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:30:00.390 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-07 08:30:00.391 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:30:00.392  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-07 08:30:00.393  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:30:00.393  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:30:00.394  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:30:00.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:30:00.403  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:30:00.403  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:30:00.404  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:30:00.406  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:30:00.536  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:30:00.537  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:30:00.538 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:30:00.599 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:30:00.601  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:30:00.602  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:30:00.605  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:30:00.606  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:30:00.606  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:30:00.607  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:30:00.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:30:00.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:30:00.695 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:30:00.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:30:00.699 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:30:00.700 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:30:00.703 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:30:00.707 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:f8:47:e3:fe:5f:f2:64:3b:fa:1c:66:18:dc:87:66:47:32:b2:89] modulus: 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 public exponent: 10001 ] 2021-07-07 08:32:17.409  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:32:17.410 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:32:17.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-07-07 08:32:17.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:32:17.413  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-07-07 08:32:17.414  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:32:17.414  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:32:17.414  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:32:17.415  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:32:17.421  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:32:17.421  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:32:17.422  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:32:17.424  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:32:17.595  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:32:17.596  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:32:17.596 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:32:17.599 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:32:17.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:32:17.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:32:17.603  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:32:17.603  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:32:17.604  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:32:17.604  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:32:17.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:32:17.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:32:17.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:32:17.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:32:17.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:32:17.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:32:17.607 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:32:17.610 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:a8:61:19:53:92:9a:81:fd:1d:03:2c:f0:e4:35:ac:fe:2f:65:4b] modulus: 88822d4bc6c0bfd3a64dcd0aa7ab9149e7f5390960d93510e310398c64183e43f154d62bcae0693be8ba12137a312b7eb39996d6c08b2467df7172b14014980d5b38730ede38543916338107f6a9bbe97493c4e71db9d7d4ce2205f3a5b31279e7a10561c89a965c4e886f26157e0aa2870ce49da8dd89598c60741cae2d178ae687834cf24faa31551f4e3fce31e5eeb8ef655d4efccd7f788b6498755e9bba40e8b7da11393074e3c781f70d2a6c277ab675452c5a4f7f9fdd2c93ecc9c8c3e0af6f2c032b883823740117980f4d83ab985aa0cf826f40b8420e4144a900d67092a6f6cb05cb09f988590eb64a02b3bb3d6555bc8bfbe4f3fdbe718802ac4b public exponent: 10001 ] 2021-07-07 08:35:35.518  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:35:35.519 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:35:35.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-07-07 08:35:35.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:35:35.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-07-07 08:35:35.522  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:35:35.522  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:35:35.522  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:35:35.523  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:35:35.530  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:35:35.530  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:35:35.530  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:35:35.532  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:35:35.694  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:35:35.695  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:35:35.696 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:35:35.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:35:35.700  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:35:35.700  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:35:35.704  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:35:35.705  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:35:35.706  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:35:35.706  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:35:35.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:35:35.707 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:35:35.707 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:35:35.707 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:35:35.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:35:35.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:35:35.709 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:35:35.711 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: db87f931f87d12df8dbc9d0e0850e7c38aa9094ea35834f9b00173ffba3c8e592c5a065fb7f7e934740675b2967020260b0f60b41fa68055e64cf044bafdb6e1b6c77763d3650b688830ec82a2ec1159e93e814848a3cb6294a15039e6feb4c288b6d5914bc752a68251dcf0e8df6150c79f2919f69934e84dbffc642e771d3dfe74569f6fd99a7bcb8ee2955fbc00d90ddfe3bcf82a5e465334c0473660cbc11d8e26827ec3001b9898338f847a055ff48e941a2c1128b71f9e3f3fea8970a60b1a8519b0d9627a0a2fa25653ebf4ca107ab2058f2f56a796f529acecd76331ce2a73adf72a45eb78762d0b6f5e72f94776a0623e100868197412bb6e114d015d6d7394db8d53aaacc5c53fbc41f136f332187dc1d8ad18cca42b8be621828e7a7900b4677fc127625537be9f551e8b4361f0435c826ed8ea4d5dda4363f85b161f0fc2f26bab1460f8a74ecd3c7ede2ee478f61f06fa689651d954b27b6469b7c7b3e6e8709c9e32774e86e57cb8ea51c60eec86386bf7637bdda521e125ff public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a5:bc:91:9e:41:c4:b2:bc:3e:ff:25:3f:53:b9:d6:72:bc:9a:7f:53] modulus: 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 public exponent: 10001 ] 2021-07-07 08:35:37.348  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:35:37.350 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:35:37.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-07 08:35:37.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:35:37.352  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-07 08:35:37.353  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:35:37.353  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:35:37.353  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:35:37.354  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:35:37.361  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:35:37.361  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:35:37.362  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:35:37.363  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:35:37.452  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:35:37.496  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:35:37.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:35:37.500 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:35:37.502  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:35:37.502  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:35:37.503  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:35:37.504  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:35:37.504  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:35:37.504  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:35:37.504 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:35:37.505 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:35:37.505 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:35:37.505 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:35:37.506 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:35:37.506 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:35:37.507 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:35:37.509 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:b1:f0:cd:a6:0e:ba:4d:98:f0:b7:43:8e:98:89:8b:aa:2e:c3:bf] modulus: 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 public exponent: 10001 ] 2021-07-07 08:36:17.611  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:36:17.612 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:36:17.613 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-07 08:36:17.614 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:36:17.614  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-07-07 08:36:17.615  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:36:17.615  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:36:17.615  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:36:17.615  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:36:17.620  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:36:17.620  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:36:17.621  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:36:17.622  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:36:17.814  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:36:17.815  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:36:17.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:36:17.817 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:36:17.818  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:36:17.818  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:36:17.820  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:36:17.821  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:36:17.821  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:36:17.821  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:36:17.822 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:36:17.822 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:36:17.822 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:36:17.822 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:36:17.823 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:36:17.823 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:36:17.824 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:36:17.826 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:6a:f7:37:65:12:bd:ef:5c:b6:19:8a:f4:30:c0:0c:60:8f:d5:88] modulus: 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 public exponent: 10001 ] 2021-07-07 08:36:42.836  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:36:42.837 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:36:42.838 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-07-07 08:36:42.839 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:36:42.839  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-07-07 08:36:42.840  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:36:42.841  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:36:42.841  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:36:42.842  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:36:42.895  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:36:42.896  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:36:42.897  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:36:42.899  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:36:42.986  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:36:42.986  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:36:42.987 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:36:42.995 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:36:42.996  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:36:42.996  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:36:42.997  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:36:42.997  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:36:42.998  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:36:42.998  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:36:42.998 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:36:42.998 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:36:42.998 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:36:42.999 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:36:42.999 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:36:42.999 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:36:43.000 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:36:43.002 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:f3:58:99:00:31:26:95:0d:78:07:da:e7:fc:d8:d7:fa:7a:a2:21] modulus: 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 public exponent: 10001 ] 2021-07-07 08:38:23.443  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:38:23.445 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:38:23.447 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-07 08:38:23.447 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:38:23.447  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-07-07 08:38:23.448  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:38:23.448  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:38:23.448  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:38:23.449  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:38:23.452  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:38:23.453  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:38:23.453  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:38:23.454  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:38:23.572  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:38:23.573  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:38:23.573 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:38:23.574 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:38:23.575  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:38:23.575  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:38:23.577  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:38:23.578  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:38:23.578  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:38:23.579  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:38:23.579 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:38:23.579 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:38:23.579 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:38:23.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:38:23.595 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:38:23.596 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:38:23.597 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:38:23.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:d2:68:22:81:2b:d0:20:60:fc:5c:a8:0f:6d:2c:69:f2:a9:a4:f2] modulus: 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 public exponent: 10001 ] 2021-07-07 08:39:00.992  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:39:00.993 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:39:00.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-07 08:39:00.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:39:00.995  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-07-07 08:39:00.995  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:39:00.995  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:39:00.995  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:39:00.996  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:39:01.000  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:39:01.000  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:39:01.000  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:39:01.001  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:39:01.090  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:39:01.090  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:39:01.091 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:39:01.096 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:39:01.096  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:39:01.097  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:39:01.098  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:39:01.099  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:39:01.099  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:39:01.099  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:39:01.099 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:39:01.099 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:39:01.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:39:01.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:39:01.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:39:01.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:39:01.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:39:01.103 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:ca:3b:6e:8e:48:6a:92:7e:18:47:ae:29:2e:ac:6f:8d:f5:cd:aa] modulus: 8c0d2e5d671ff55a99f36bca907dae2f01adf86ae3683c449859fefde9bca097f1635b4a488428b91530da299d2581ef1bab664ec730b98bf8503d292497af074d1163cb0b7c39e39b2277280668e2e6079dcce61d5b3f74d0f9c0e29dfe25268e6c5a24e0912f20695df75fee3ae2267877e79e048abe05c5c9292391bc99297d2a2b5e8e0d3e9efdbed8f20c266d0081c27124d09115d629bd46903bdfb45776ab7fa3739694b4edc0370473664aaebd187ab1688f5b90c21dd62bd5af6c73b527b7cc08c2cf6751d4a8d8c568144cc13198a340804d220b6608695dd3a22df91334fab09c49c93a811ee79a55f5288fb3932ab3893fd3984762027d1a7e7b public exponent: 10001 ] 2021-07-07 08:40:03.347  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:40:03.348 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:40:03.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-07 08:40:03.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:40:03.350  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-07 08:40:03.351  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:40:03.351  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:40:03.351  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:40:03.352  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:40:03.357  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:40:03.357  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:40:03.358  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:40:03.359  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:40:03.459  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:40:03.460  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:40:03.460 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:40:03.461 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:40:03.462  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:40:03.463  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:40:03.464  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:40:03.464  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:40:03.464  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:40:03.465  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:40:03.465 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:40:03.465 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:40:03.466 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:40:03.466 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:40:03.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:40:03.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:40:03.495 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:40:03.498 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:5e:06:bf:5a:0a:04:4c:a0:3c:ca:80:5a:73:44:d2:90:29:b4:85] modulus: 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 public exponent: 10001 ] 2021-07-07 08:43:00.510  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:43:00.511 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:43:00.513 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-07 08:43:00.513 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:43:00.514  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-07 08:43:00.514  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:43:00.515  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:43:00.515  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:43:00.515  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:43:00.521  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:43:00.521  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:43:00.522  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:43:00.522  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:43:00.624  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:43:00.625  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:43:00.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:43:00.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:43:00.628  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:43:00.629  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:43:00.630  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:43:00.630  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:43:00.630  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:43:00.631  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:43:00.631 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:43:00.631 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:43:00.631 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:43:00.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:43:00.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:43:00.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:43:00.633 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:43:00.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:69:35:5d:d2:bf:f6:1f:51:59:14:3b:13:fd:af:3b:70:aa:66:5d] modulus: 97a32b247f98f853934badd757ac50fe9c512f7f853ce9c03dfe293e4c151de26f87d0338ba3fdd683935bdf3852ccdc44827ea9e29df56a8a23f15a9e78574fcf3a40f484db56b425744da9306d89fccbd2376b1096f2113f3797e96e18d473bca55abc3022e0bb49e1745df0eb12dd6c61958ac29114eb10f3f51dd144ba4fbef77ff4dff5a21773d9cc3f5631c74daf7f72ff9fdba02d2b8a29aa67120f0c2f833cc37e852a285f6188f417fe227c987a1d94ea7d9e0c2ae4820ba25b4b7054e42339c80f3f6426c888bfbc035934f28ea3a8f7ee94e70a25412cfec62e27a17677274f3e8709e2a22c23779f743582d49d4fe465c7417630c7666c8ab39b public exponent: 10001 ] 2021-07-07 08:45:23.231  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:45:23.231 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:45:23.232 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-07 08:45:23.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:45:23.233  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-07 08:45:23.233  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:45:23.233  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:45:23.234  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:45:23.234  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:45:23.238  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:45:23.238  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:45:23.239  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:45:23.239  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:45:23.326  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:45:23.327  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:45:23.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:45:23.328 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:45:23.329  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:45:23.329  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:45:23.330  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:45:23.330  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:45:23.331  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:45:23.331  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:45:23.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:45:23.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:45:23.331 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:45:23.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:45:23.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:45:23.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:45:23.333 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:45:23.335 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:46:86:1c:4e:ea:cf:c8:65:8b:eb:b0:4c:ea:cb:ac:b7:8c:6e:c9] modulus: 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 public exponent: 10001 ] 2021-07-07 08:47:29.171  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-07-07 08:47:29.172 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-07-07 08:47:29.174 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-07 08:47:29.174 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-07-07 08:47:29.175  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-07-07 08:47:29.175  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-07-07 08:47:29.175  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-07-07 08:47:29.176  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-07-07 08:47:29.176  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-07-07 08:47:29.181  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-07-07 08:47:29.181  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:47:29.181  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-07-07 08:47:29.182  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-07-07 08:47:29.295  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-07-07 08:47:29.296  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-07-07 08:47:29.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-07-07 08:47:29.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-07-07 08:47:29.298  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1086 2021-07-07 08:47:29.298  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-07-07 08:47:29.299  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-07-07 08:47:29.300  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-07-07 08:47:29.300  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-07-07 08:47:29.300  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-07-07 08:47:29.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:47:29.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:47:29.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:47:29.302 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-07-07 08:47:29.302 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-07-07 08:47:29.303 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-07-07 08:47:29.303 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart 2021-07-07 08:47:29.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350934672442252854661050985128635543447139202208 IssuerDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 07 06:41:24 UTC 2021 Final Date: Mon Jul 07 06:41:24 UTC 2031 SubjectDN: UID=c-011adac4d3c051031,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7b:1d:92:2a:99:b0:e5:6e:23:b1:dd:d6:80:76:3c:d9:cc:a2:9f:de] modulus: db87f931f87d12df8dbc9d0e0850e7c38aa9094ea35834f9b00173ffba3c8e592c5a065fb7f7e934740675b2967020260b0f60b41fa68055e64cf044bafdb6e1b6c77763d3650b688830ec82a2ec1159e93e814848a3cb6294a15039e6feb4c288b6d5914bc752a68251dcf0e8df6150c79f2919f69934e84dbffc642e771d3dfe74569f6fd99a7bcb8ee2955fbc00d90ddfe3bcf82a5e465334c0473660cbc11d8e26827ec3001b9898338f847a055ff48e941a2c1128b71f9e3f3fea8970a60b1a8519b0d9627a0a2fa25653ebf4ca107ab2058f2f56a796f529acecd76331ce2a73adf72a45eb78762d0b6f5e72f94776a0623e100868197412bb6e114d015d6d7394db8d53aaacc5c53fbc41f136f332187dc1d8ad18cca42b8be621828e7a7900b4677fc127625537be9f551e8b4361f0435c826ed8ea4d5dda4363f85b161f0fc2f26bab1460f8a74ecd3c7ede2ee478f61f06fa689651d954b27b6469b7c7b3e6e8709c9e32774e86e57cb8ea51c60eec86386bf7637bdda521e125ff public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3aebb70a0d44dd81fcb31b983a7329ca6ffa4702 d19d700adc160f93abd9f4a9c8f29efa20cab928 35844e154ca6ed163b3ef0d7df0824f097fae515 034861c14c94101bbd68821b54641db27db83fce cd9a3be6474f6961388c50f10281c16dd0e10c0b d16bf715b9c6e39522c54c637758969e577a8d38 04dfd5bb600110604267878aeec79ab98d08c9db b457e1a0c1a58d93f198f8961eee5718aa8fd541 95b300631fb29bf16532912e4c61712ac7d31195 fa9e8613842ca7d78e352d685f73174c8bcea696 833f447052393a95055ba4e20a8ac02b220e5153 0ac85a4882aff72a57025d6a78249cb223c0cb14 1a0b34454332e31f1c934082a4633da4a296f9fe a5bf85c5d755e6e2b1b7271969764a77e6ab8f42 82048cf63f8fa7a94a2a0b643fe9dcb00e7bc496 af2775adf437272f53945bb4c6fe3b0866779676 3e186f70f807e78b101bf5d84d7133d6e831d629 d1f632531626e006e147519736cb47f1f39a550a 16fe7dbcaf0638e2a43ab7822200e8f9829c8b48 28d8efd5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bf:6a:77:ec:13:72:e0:7f:6c:6a:9c:97:0f:64:b2:23:d8:4c:d7:01] modulus: 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 public exponent: 10001 ]