2021-09-26 13:29:25,104 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-26 13:29:28,505 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-26 13:29:31.017  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-09-26 13:29:41.517 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-26 13:29:42.597  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-09-26 13:29:43.112  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-26 13:29:55.903  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 32.594 seconds (JVM running for 38.821) 2021-09-26 13:44:21.015  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 13:44:21.098 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 13:44:21.200 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-26 13:44:21.204 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 13:44:21.302  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-26 13:44:21.305  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 13:44:21.309  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 13:44:21.310  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 13:44:21.310  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 13:44:21.317  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 13:44:21.399  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 13:44:21.507  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 13:44:21.513  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 13:44:21.514  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 13:44:21.603  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 13:44:27.835  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 13:44:27.839  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 13:44:27.839 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 13:44:27.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 13:44:27.845  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 13:44:27.845  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 13:44:27.850  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 13:44:27.851  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 13:44:27.899  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 13:44:27.900  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 13:44:27.900 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 13:44:27.901 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 13:44:27.901 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 13:44:27.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 13:44:27.912 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 13:44:27.912 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 13:44:27.918 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 13:44:28.105 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:4b:e3:11:df:92:af:85:c9:e8:e8:0e:58:aa:0e:df:b7:a0:2e:1f] modulus: c8e9f2da595ac93c77eb1273c7e2bfd3ab9d5d094b09af59c05e5dd7519626c3acf6ceef522b291f422b9d17358bad77c252f608392d14bd7dad95542646aff77e7261c9997747e1fc2e942e3fe635507edf08569b014650617b41e22443fdbf6f0e540bbb7690f0c775ff6578819faca04b9dd8b2d1c89d37b206f1fba3b1f435c6b38afc2b146fe0208bf25fda055087703e1507bcce769aea45a5aa7510d2f6a07429a16d3fbb3a3b0cee6fba1e750cf556f6067dce105a4f4942b6cc681e97c6457b5f4c24df03e9ac30cce180d6bea691a667fae0dcc276c20354927cd98cb21425e623742b3b7b8efeeff2782aa5fba8da424e3048e3b3746bae0b0279 public exponent: 10001 ] 2021-09-26 15:21:56.676  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:21:56.678 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:21:56.680 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-26 15:21:56.684 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:21:56.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-26 15:21:56.687  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:21:56.688  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:21:56.689  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:21:56.689  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:21:56.717  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:21:56.718  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:21:56.797  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:21:56.802  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:21:56.992  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:21:56.993  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:21:56.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:21:56.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:21:56.997  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:21:56.997  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:21:56.999  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:21:56.999  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:21:57.000  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:21:57.000  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:21:57.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:21:57.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:21:57.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:21:57.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:21:57.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:21:57.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:21:57.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:21:57.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:ca:17:ef:2e:df:5b:a0:a4:39:3d:50:87:84:ff:12:a5:b3:39:e2] modulus: af03ea077044ab095337e435318f8107a2a08133de9f473461d8b4c21320bdf5074bb76f1dffe4c0ebdea304552062757e234936128cd7b42d9700db666b24e0f348995fd2f9f15592ca0a98e5b8cf2039db22063522227807ff2b7ac1d36a58984b89203038f5f27c4228f746c8243c7f5f33bb038f870e5515487bd1d7999d2a6ba925d676510f40519aa83bc9a11c59762b6f278b30d1a0dc0d3c7a9f56792b204d1aa6a0bf31aac51f053cf062500382353908dbd1e7571b142dec1bb9d5c65440b81e7c580e5cd9304e79f8dbb27c508e2f2803a62522270398a1e28ceda9225cf2b87d792e043f7023ae7268c93a2dc53ec49bd89cd9e356d32e4c382b public exponent: 10001 ] 2021-09-26 15:24:28.549  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:24:28.551 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:24:28.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-09-26 15:24:28.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:24:28.554  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-09-26 15:24:28.555  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:24:28.555  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:24:28.555  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:24:28.556  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:24:28.598  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:24:28.599  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:24:28.599  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:24:28.601  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:24:28.720  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:24:28.720  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:24:28.721 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:24:28.723 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:24:28.723  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:24:28.724  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:24:28.725  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:24:28.726  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:24:28.726  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:24:28.726  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:24:28.727 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:24:28.727 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:24:28.727 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:24:28.728 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:24:28.728 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:24:28.729 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:24:28.730 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:24:28.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:cd:61:2e:91:61:db:57:cb:d4:2a:ca:e6:4a:52:80:f0:d9:e9:07] modulus: 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 public exponent: 10001 ] 2021-09-26 15:26:45.315  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:26:45.316 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:26:45.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-26 15:26:45.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:26:45.318  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-26 15:26:45.319  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:26:45.319  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:26:45.320  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:26:45.321  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:26:45.325  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:26:45.325  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:26:45.397  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:26:45.399  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:26:45.583  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:26:45.584  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:26:45.585 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:26:45.587 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:26:45.588  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:26:45.589  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:26:45.597  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:26:45.597  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:26:45.598  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:26:45.599  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:26:45.599 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:26:45.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:26:45.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:26:45.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:26:45.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:26:45.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:26:45.603 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:26:45.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:7c:67:5c:69:e6:5c:fe:51:6b:96:05:df:01:d9:15:2d:9a:02:f4] modulus: 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 public exponent: 10001 ] 2021-09-26 15:27:15.632  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:27:15.633 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:27:15.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-09-26 15:27:15.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:27:15.635  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-09-26 15:27:15.635  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:27:15.636  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:27:15.636  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:27:15.636  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:27:15.640  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:27:15.640  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:27:15.641  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:27:15.642  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:27:15.738  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:27:15.738  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:27:15.739 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:27:15.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:27:15.741  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:27:15.741  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:27:15.798  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:27:15.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:27:15.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:27:15.799  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:27:15.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:27:15.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:27:15.800 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:27:15.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:27:15.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:27:15.801 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:27:15.802 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:27:15.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3f:ea:df:c9:44:1f:77:92:78:63:36:01:e4:a8:43:82:66:31:93:47] modulus: 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 public exponent: 10001 ] 2021-09-26 15:27:48.795  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:27:48.796 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:27:48.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-09-26 15:27:48.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:27:48.799  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-09-26 15:27:48.799  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:27:48.800  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:27:48.800  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:27:48.801  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:27:48.809  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:27:48.809  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:27:48.809  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:27:48.811  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:27:48.908  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:27:48.909  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:27:48.909 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:27:48.910 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:27:48.911  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:27:48.911  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:27:48.912  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:27:48.912  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:27:48.913  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:27:48.913  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:27:48.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:27:48.913 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:27:48.914 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:27:48.914 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:27:48.914 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:27:48.915 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:27:48.915 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:27:48.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:58:1b:a5:bf:ad:9f:bf:70:eb:70:88:df:6b:fd:5b:cd:08:43:21] modulus: 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 public exponent: 10001 ] 2021-09-26 15:28:52.461  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:28:52.462 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:28:52.463 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-26 15:28:52.464 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:28:52.464  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-26 15:28:52.464  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:28:52.465  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:28:52.465  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:28:52.465  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:28:52.469  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:28:52.470  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:28:52.470  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:28:52.471  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:28:52.561  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:28:52.562  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:28:52.562 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:28:52.563 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:28:52.564  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:28:52.564  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:28:52.565  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:28:52.565  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:28:52.566  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:28:52.566  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:28:52.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:28:52.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:28:52.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:28:52.568 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:28:52.568 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:28:52.568 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:28:52.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:28:52.571 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:1c:28:35:86:d8:bb:e6:f5:d9:a1:be:49:10:4c:93:67:da:2a:37] modulus: 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 public exponent: 10001 ] 2021-09-26 15:30:28.420  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:30:28.420 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:30:28.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-09-26 15:30:28.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:30:28.422  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-09-26 15:30:28.423  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:30:28.423  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:30:28.423  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:30:28.423  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:30:28.427  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:30:28.428  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:30:28.428  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:30:28.430  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:30:28.548  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:30:28.548  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:30:28.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:30:28.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:30:28.550  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:30:28.550  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:30:28.552  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:30:28.552  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:30:28.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:30:28.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:30:28.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:30:28.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:30:28.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:30:28.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:30:28.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:30:28.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:30:28.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:30:28.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:9a:5d:3a:7e:0a:c8:31:fd:b3:78:85:3c:9a:20:68:c2:b3:87:95] modulus: 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 public exponent: 10001 ] 2021-09-26 15:31:52.896  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:31:52.897 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:31:52.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-26 15:31:52.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:31:52.899  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-26 15:31:52.899  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:31:52.900  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:31:52.900  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:31:52.900  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:31:52.904  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:31:52.904  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:31:52.905  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:31:52.906  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:31:52.995  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:31:52.995  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:31:52.995 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:31:52.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:31:52.997  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:31:52.997  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:31:52.998  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:31:52.999  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:31:52.999  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:31:52.999  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:31:52.999 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:31:53.000 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:31:53.000 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:31:53.000 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:31:53.000 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:31:53.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:31:53.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:31:53.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:44:10:6f:01:be:32:55:d4:12:ac:cf:e7:58:8b:8c:bd:2f:33:cb] modulus: b79209bcf0122f7e710534efd7d6b5d1f5faa853c8276225c53d91f6230b85a939cd8887ec1e471f82c0037c0c6e08e9e7c17c13ca4fcb1e9912c91bd75e9e42df85ec5fbca4b7db03447d1dcfca24234c5faacf27592da17e7bf575d2583e32d7fe32b109129efefffdb18f0e098e788d9bd50a0e465f7578e1737072ce02ad876ddf68dc41f56adcc5b4c8c1b96aff03d2c56f316226bcafaeee26ad1fb241bc4f15d356be29a914352ffed2b78625f80d7ee288f25732f51dc8bfc351fe5a8747bfb6ae6679bbc8a73406333204cc7b4e9b207f3907839a4d37ea0717df22eed5bf4e2a0fad0fe746dcdcab97e912de2cbc9e12a9a22d5c739ca102cf791d public exponent: 10001 ] 2021-09-26 15:32:09.996  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:32:09.997 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:32:09.998 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-26 15:32:09.998 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:32:09.999  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-26 15:32:09.999  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:32:09.999  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:32:10.000  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:32:10.000  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:32:10.004  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:32:10.004  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:32:10.005  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:32:10.006  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:32:10.114  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:32:10.115  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:32:10.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:32:10.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:32:10.117  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:32:10.117  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:32:10.118  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:32:10.119  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:32:10.119  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:32:10.119  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:32:10.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:32:10.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:32:10.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:32:10.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:32:10.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:32:10.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:32:10.122 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:32:10.124 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [16:74:9e:ba:50:8f:44:f1:1b:f0:fa:6f:16:65:16:7a:c4:14:2d:ac] modulus: 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 public exponent: 10001 ] 2021-09-26 15:35:09.796  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:35:09.798 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:35:09.799 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-26 15:35:09.800 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:35:09.800  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-26 15:35:09.800  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:35:09.801  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:35:09.801  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:35:09.801  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:35:09.806  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:35:09.806  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:35:09.806  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:35:09.808  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:35:09.914  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:35:09.914  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:35:09.914 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:35:09.916 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:35:09.916  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:35:09.916  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:35:09.917  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:35:09.918  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:35:09.918  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:35:09.918  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:35:09.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:35:09.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:35:09.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:35:09.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:35:09.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:35:09.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:35:09.920 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:35:09.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:b3:14:33:ff:b4:78:b6:3e:d0:1d:01:70:5c:3e:47:77:19:ef:2e] modulus: a73c2b176f334d844990f9b22e08b67e2deb45946dc23e6a70fb4b78fac2274e3a91655ef2251f116eadb4d883a14792a456cfed7c6daf84013963ccc756c8af7f13c9d044736dc6daf142592719aa79335e3e3d20a95cc549af6594a5789522b817ead365b501f3dc255091fdc42d8f085ad9305e8cc6655cad7310e3a8e991fba338ed9be917747cb1d99fdd67dcac7d6e8dca415e242a89ef4d2658ec90a91559130ed8d58795e7a95ed14fda2f6e4fc1636a43e3924475b9d520a1f7298afabd9acf3d43ed26407bdec6ba35d8366ed926c2a07a9f233e7a6672b12de44d83996594a7f4d6bb5a3d44bc53443194d87475c8025b1bcc5e1f116b9d8f35a1 public exponent: 10001 ] 2021-09-26 15:36:55.889  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:36:55.891 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:36:55.893 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-26 15:36:55.893 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:36:55.893  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-26 15:36:55.894  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:36:55.894  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:36:55.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:36:55.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:36:55.900  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:36:55.900  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:36:55.901  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:36:55.902  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:36:55.999  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:36:55.999  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:36:56.000 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:36:56.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:36:56.001  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:36:56.001  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:36:56.003  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:36:56.003  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:36:56.003  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:36:56.004  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:36:56.004 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:36:56.004 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:36:56.004 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:36:56.005 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:36:56.005 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:36:56.005 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:36:56.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:36:56.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f7:3e:fd:2f:5c:a6:1e:5b:6b:4d:9b:61:b1:87:d5:3b:7a:49:43:fc] modulus: 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 public exponent: 10001 ] 2021-09-26 15:38:29.799  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-26 15:38:29.800 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 15:38:29.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-26 15:38:29.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 15:38:29.802  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-26 15:38:29.803  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-26 15:38:29.803  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 15:38:29.803  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 15:38:29.804  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 15:38:29.807  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 15:38:29.808  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:38:29.808  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 15:38:29.809  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 15:38:29.912  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 15:38:29.913  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-26 15:38:29.913 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-26 15:38:29.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-26 15:38:29.915  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1967 2021-09-26 15:38:29.915  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-26 15:38:29.916  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-26 15:38:29.916  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-26 15:38:29.917  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-26 15:38:29.917  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 15:38:29.917 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:38:29.917 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:38:29.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:38:29.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 15:38:29.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 15:38:29.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 15:38:29.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 15:38:29.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 496753781916789996859139903494016826285171796699 IssuerDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 13:25:39 UTC 2021 Final Date: Fri Sep 26 13:25:39 UTC 2031 SubjectDN: UID=c-056c540bb2f87e406,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [be:1d:11:a0:80:11:67:f4:39:70:6d:54:b2:8e:9b:ed:0f:10:ee:98] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6dfee14deb6cd7ae4690bb6467e1ff6384da2b98 6ebb1741b85836a186b648fb6e0ba9530fec7678 e258722061438558a3b24b27d05a3c7142e290b1 99fff4c78a46df624bdbd966806a6e1faa2a0000 689ea06b1c0bab31fa7e72c56893cf9d86e88174 254fa18a711ca7c726bd58bf275a2e68482323c9 e8554f4a529d7d8cfc7da1a2a06e74aeac2bbbda 64aa7cc3c293ebeb82c6c468d2c9e666c9c6fd69 b9a4297b8c0a92b413dcfb4321d62ba3028f0bed e28627020e2b1156c710e9b6fa177dc57ebf540c ea9e90e6ee91e7541f8301c5e3bc848e06af3cb2 e4feeb79d34e791ff1866b8edf0daaac97330b44 cc713a78814a026f05c946c5482d9177e975e703 040195f43a0fecda12310cdace8ccca1ce147ef6 4414c7995dcc7df9afad7c043925926d8dee9a91 bd935f2d2816fef6847fa472ff759684368df2b7 25d9b8a84905b22e8adb06a1f83146d6228c7448 3b4b8b395c179ed26921600cd4c1c2b0aa97266e 88469d2f46dd32d16cd6f72fd0cb8265de3db10b 5f2a35af Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:b0:99:6c:04:32:ae:b9:c2:f4:2a:8b:9c:34:34:9f:35:17:37:fe] modulus: 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 public exponent: 10001 ]