Results

By type

          2021-04-01 04:01:08,938 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-04-01 04:01:12,320 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-04-01 04:01:14.929  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-04-01 04:01:25.537 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-04-01 04:01:26.827  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-04-01 04:01:27.522  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-04-01 04:01:39.821  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.874 seconds (JVM running for 39.381)
2021-04-01 04:12:55.421  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 04:12:55.432 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 04:12:55.638 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-04-01 04:12:55.646 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 04:12:55.732  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-04-01 04:12:55.819  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 04:12:55.826  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 04:12:55.827  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 04:12:55.827  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 04:12:55.834  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 04:12:55.837  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 04:12:56.022  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 04:12:56.028  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 04:12:56.028  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 04:12:56.128  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 04:12:57.623  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-01 04:12:57.640  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-01 04:12:57.641 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-01 04:12:57.650 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-01 04:12:57.718  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1937
2021-04-01 04:12:57.719  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-01 04:12:57.724  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-01 04:12:57.724  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-01 04:12:57.731  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-01 04:12:57.731  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-01 04:12:57.732 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 04:12:57.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 04:12:57.733 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 04:12:57.823 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 04:12:57.824 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 04:12:57.824 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 04:12:57.834 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-01 04:12:58.022 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22638530990017240415944046650088981133966721636
             IssuerDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 01 03:58:07 UTC 2021
           Final Date: Tue Apr 01 03:58:07 UTC 2031
            SubjectDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:cf:33:c0:ad:86:75:fe:02:72:57:7a:fe:c1:76:2d:4b:d6:b0:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 21d367069bec8ccb363cdffc840e73aad773960f
                       f5a8ec89c8d7e0c0e95f5de37421833a5d22a733
                       044b06cb4ed682bbffd14354bb8f678147732722
                       fd5fc7dd7ef2aafd4b2f01f881acaaa3457a7be1
                       0d0078da002efa307519248839f3bcefe22d9dcd
                       795f09e1356ad1b9309a46f106e89070e68c4e35
                       7412d1d5c1913aa40e9e43186bdbda2332643711
                       1f14390db543b03a79971daeafe22156d506a6d0
                       af4cb5fd0379eeef8e78dbd3723e1fce34cbfb68
                       a19b64f6ae108c4d1b112c9790964dcfdbdd7135
                       39989ae59a41c8da70c4d1a389c98094ff363233
                       a9ca684af49ce4aaa6c7f14e594b8dbfc00ae176
                       baca7a56203dbcce58d9145bb9f991a0628d9549
                       ad8d21e9b1db8dc9be1af3398869434d0a4137e4
                       e6a56702d6a3dea62073ab59a54ede6e20058b2a
                       95582014b0167799db28f2ddabd00c05dba43562
                       dfd14887866a62e1db006432db8982c5de3ff847
                       626ec08e43158f4051943ee45e3354af047ceca7
                       6d04213f2f97c69f81d4f7140d80dba8a41a1c7d
                       7ed2f0e9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [37:5a:77:26:98:73:e2:91:7e:30:c8:f3:5b:b3:bc:dc:01:32:e1:f7]
            modulus: 8d0dad1e03c1fde000ef2f8112b6d5ae1b4b58b22117bf73837c4fed42630c8cc88478b852521c5a87bbc46a5a390035e7fe71f1fbabcba1c476a4a870d8c0109c47f8aebbb1808edb189b5e93503713eb40e1c15e3440fc53cd23baca58fb4441b9d60a734cb376ed4da0b0db75d08f7d39162cee7a81931edf1006a38ab56c185a1598e8fb31ec3ae30279289337d8c8af7b7765b52a35874555fc27c79a92af006d4a787cd43839302421e0bdc952ba01caa83e2d13e6a89432278d6ac8ec491ff177d700161db219459c8b8870e50ddd08ef8cb3fc26c51fb05e9ca21c44ff6acfab8d8ab9be13701ccd059971f861b9b52899e42ab8f1e0bb97abdd44cb
    public exponent: 10001

] 
2021-04-01 05:06:38.725  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:06:38.727 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:06:38.729 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-01 05:06:38.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:06:38.731  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-01 05:06:38.732  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:06:38.732  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:06:38.733  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:06:38.733  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:06:38.821  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:06:38.822  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:06:38.823  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:06:38.826  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:06:39.218  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-01 05:06:39.219  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-01 05:06:39.219 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-01 05:06:39.223 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-01 05:06:39.224  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1937
2021-04-01 05:06:39.224  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-01 05:06:39.227  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-01 05:06:39.228  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-01 05:06:39.228  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-01 05:06:39.228  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-01 05:06:39.229 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:06:39.229 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:06:39.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:06:39.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:06:39.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:06:39.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:06:39.233 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-01 05:06:39.323 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22638530990017240415944046650088981133966721636
             IssuerDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 01 03:58:07 UTC 2021
           Final Date: Tue Apr 01 03:58:07 UTC 2031
            SubjectDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:cf:33:c0:ad:86:75:fe:02:72:57:7a:fe:c1:76:2d:4b:d6:b0:45]
            modulus: b0fd333829acaa4a4142a26b79cdde40be7a0d8c34ca532db5a1633f14313d8526be0943ba85dc4790077414f77df7d2c363112da61c18c9c898d4b062c509fd9ec21dd80ff7e6b5dbb581ae6ddf00d43f60101b49856cc8a2aa9dc75aa17ea6308b604b2e212386ae06e57b8e2c1a1bd9d6b34c33a51688dab9ec516b8370f037b9f279b494d81eeec8a3aaafc4de4c7e41294b1019210138d4166d4d04fea9b105409d2eda02b9a89f7c54391acc21894994d44335698162af60dc02fd750ab85bd8b36e1a27073a65fcd320e788b41d99c571d4c0406f0c8c474b3abaef14fc92d9ae76fe69eeaee4b77944121af4eb42130dfdd859da7ed992088e3717b299a04523e35ff466e084f0b961cb143b4797def517d7173db5efe5683a22718a5faf4c99d8f1c6fb84827a25abbfea4d6bcabd17bdf64b46ab312acfb827d6ceb0eccd0001b0087a74aae3e043e974a970700346d28b50ebe28403e4c79e18f52bb37566e0ca74ef2ec569ce80319a539586c5c083de8658a9575adf1803e845
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 21d367069bec8ccb363cdffc840e73aad773960f
                       f5a8ec89c8d7e0c0e95f5de37421833a5d22a733
                       044b06cb4ed682bbffd14354bb8f678147732722
                       fd5fc7dd7ef2aafd4b2f01f881acaaa3457a7be1
                       0d0078da002efa307519248839f3bcefe22d9dcd
                       795f09e1356ad1b9309a46f106e89070e68c4e35
                       7412d1d5c1913aa40e9e43186bdbda2332643711
                       1f14390db543b03a79971daeafe22156d506a6d0
                       af4cb5fd0379eeef8e78dbd3723e1fce34cbfb68
                       a19b64f6ae108c4d1b112c9790964dcfdbdd7135
                       39989ae59a41c8da70c4d1a389c98094ff363233
                       a9ca684af49ce4aaa6c7f14e594b8dbfc00ae176
                       baca7a56203dbcce58d9145bb9f991a0628d9549
                       ad8d21e9b1db8dc9be1af3398869434d0a4137e4
                       e6a56702d6a3dea62073ab59a54ede6e20058b2a
                       95582014b0167799db28f2ddabd00c05dba43562
                       dfd14887866a62e1db006432db8982c5de3ff847
                       626ec08e43158f4051943ee45e3354af047ceca7
                       6d04213f2f97c69f81d4f7140d80dba8a41a1c7d
                       7ed2f0e9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:7e:c5:e1:df:c0:1c:07:c8:3b:97:d2:82:0c:39:2a:55:74:26:6c]
            modulus: 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
    public exponent: 10001

] 
2021-04-01 05:09:31.494  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:09:31.495 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:09:31.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-01 05:09:31.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:09:31.498  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-01 05:09:31.499  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:09:31.499  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:09:31.500  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:09:31.500  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:09:31.505  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:09:31.506  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:09:31.506  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:09:31.518  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:09:31.673  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-01 05:09:31.674  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-01 05:09:31.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-01 05:09:31.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-01 05:09:31.678  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1937
2021-04-01 05:09:31.679  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-01 05:09:31.680  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-01 05:09:31.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-01 05:09:31.682  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-01 05:09:31.682  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-01 05:09:31.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:09:31.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:09:31.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:09:31.684 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:09:31.684 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:09:31.685 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:09:31.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-01 05:09:31.719 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22638530990017240415944046650088981133966721636
             IssuerDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 01 03:58:07 UTC 2021
           Final Date: Tue Apr 01 03:58:07 UTC 2031
            SubjectDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:cf:33:c0:ad:86:75:fe:02:72:57:7a:fe:c1:76:2d:4b:d6:b0:45]
            modulus: b0fd333829acaa4a4142a26b79cdde40be7a0d8c34ca532db5a1633f14313d8526be0943ba85dc4790077414f77df7d2c363112da61c18c9c898d4b062c509fd9ec21dd80ff7e6b5dbb581ae6ddf00d43f60101b49856cc8a2aa9dc75aa17ea6308b604b2e212386ae06e57b8e2c1a1bd9d6b34c33a51688dab9ec516b8370f037b9f279b494d81eeec8a3aaafc4de4c7e41294b1019210138d4166d4d04fea9b105409d2eda02b9a89f7c54391acc21894994d44335698162af60dc02fd750ab85bd8b36e1a27073a65fcd320e788b41d99c571d4c0406f0c8c474b3abaef14fc92d9ae76fe69eeaee4b77944121af4eb42130dfdd859da7ed992088e3717b299a04523e35ff466e084f0b961cb143b4797def517d7173db5efe5683a22718a5faf4c99d8f1c6fb84827a25abbfea4d6bcabd17bdf64b46ab312acfb827d6ceb0eccd0001b0087a74aae3e043e974a970700346d28b50ebe28403e4c79e18f52bb37566e0ca74ef2ec569ce80319a539586c5c083de8658a9575adf1803e845
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 21d367069bec8ccb363cdffc840e73aad773960f
                       f5a8ec89c8d7e0c0e95f5de37421833a5d22a733
                       044b06cb4ed682bbffd14354bb8f678147732722
                       fd5fc7dd7ef2aafd4b2f01f881acaaa3457a7be1
                       0d0078da002efa307519248839f3bcefe22d9dcd
                       795f09e1356ad1b9309a46f106e89070e68c4e35
                       7412d1d5c1913aa40e9e43186bdbda2332643711
                       1f14390db543b03a79971daeafe22156d506a6d0
                       af4cb5fd0379eeef8e78dbd3723e1fce34cbfb68
                       a19b64f6ae108c4d1b112c9790964dcfdbdd7135
                       39989ae59a41c8da70c4d1a389c98094ff363233
                       a9ca684af49ce4aaa6c7f14e594b8dbfc00ae176
                       baca7a56203dbcce58d9145bb9f991a0628d9549
                       ad8d21e9b1db8dc9be1af3398869434d0a4137e4
                       e6a56702d6a3dea62073ab59a54ede6e20058b2a
                       95582014b0167799db28f2ddabd00c05dba43562
                       dfd14887866a62e1db006432db8982c5de3ff847
                       626ec08e43158f4051943ee45e3354af047ceca7
                       6d04213f2f97c69f81d4f7140d80dba8a41a1c7d
                       7ed2f0e9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:56:b7:c4:fc:70:ff:c5:56:d4:82:8e:4a:e3:3f:4b:30:09:3a:79]
            modulus: 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
    public exponent: 10001

] 
2021-04-01 05:11:36.227  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:11:36.229 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:11:36.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:11:36.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:11:36.231  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:11:36.232  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:11:36.232  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:11:36.233  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:11:36.233  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:11:36.238  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:11:36.238  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:11:36.239  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:11:36.241  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:12:11.012  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:12:11.013 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:12:11.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:12:11.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:12:11.016  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:12:11.016  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:12:11.017  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:12:11.017  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:12:11.017  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:12:11.022  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:12:11.023  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:12:11.023  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:12:11.025  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:12:59.178  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:12:59.179 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:12:59.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:12:59.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:12:59.182  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:12:59.183  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:12:59.220  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:12:59.221  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:12:59.221  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:12:59.229  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:12:59.229  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:12:59.229  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:12:59.231  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:14:00.970 ERROR 1 [nio-8443-exec-8] o.o.o.c.c.i.Cmpv2HttpClient              : IOException error ejbca:8080 failed to respond, while trying to connect CA RA
2021-04-01 05:14:00.970 ERROR 1 [nio-8443-exec-7] o.o.o.c.c.i.Cmpv2HttpClient              : IOException error ejbca:8080 failed to respond, while trying to connect CA RA
2021-04-01 05:14:00.970 ERROR 1 [io-8443-exec-10] o.o.o.c.c.i.Cmpv2HttpClient              : IOException error ejbca:8080 failed to respond, while trying to connect CA RA
2021-04-01 05:14:00.975 ERROR 1 [nio-8443-exec-8] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client:

org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106)
	at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57)
	at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67)
	at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190)
	at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138)
	at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793)
	at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
	at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040)
	at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943)
	at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
	at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:634)
	at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:741)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)
	at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Unknown Source)
Caused by: org.apache.http.NoHttpResponseException: ejbca:8080 failed to respond
	at org.apache.http.impl.conn.DefaultHttpResponseParser.parseHead(DefaultHttpResponseParser.java:141)
	at org.apache.http.impl.conn.DefaultHttpResponseParser.parseHead(DefaultHttpResponseParser.java:56)
	at org.apache.http.impl.io.AbstractMessageParser.parse(AbstractMessageParser.java:259)
	at org.apache.http.impl.DefaultBHttpClientConnection.receiveResponseHeader(DefaultBHttpClientConnection.java:163)
	at org.apache.http.impl.conn.CPoolProxy.receiveResponseHeader(CPoolProxy.java:165)
	at org.apache.http.protocol.HttpRequestExecutor.doReceiveResponse(HttpRequestExecutor.java:273)
	at org.apache.http.protocol.HttpRequestExecutor.execute(HttpRequestExecutor.java:125)
	at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:272)
	at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185)
	at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
	at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
	at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108)
	at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke()
	at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689)
	at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$351fa70d.execute()
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71)
	... 61 more

2021-04-01 05:14:00.975 ERROR 1 [io-8443-exec-10] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client:

org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106)
	at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57)
	at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67)
	at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190)
	at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138)
	at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793)
	at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
	at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040)
	at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943)
	at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
	at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:634)
	at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:741)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)
	at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Unknown Source)
Caused by: org.apache.http.NoHttpResponseException: ejbca:8080 failed to respond
	at org.apache.http.impl.conn.DefaultHttpResponseParser.parseHead(DefaultHttpResponseParser.java:141)
	at org.apache.http.impl.conn.DefaultHttpResponseParser.parseHead(DefaultHttpResponseParser.java:56)
	at org.apache.http.impl.io.AbstractMessageParser.parse(AbstractMessageParser.java:259)
	at org.apache.http.impl.DefaultBHttpClientConnection.receiveResponseHeader(DefaultBHttpClientConnection.java:163)
	at org.apache.http.impl.conn.CPoolProxy.receiveResponseHeader(CPoolProxy.java:165)
	at org.apache.http.protocol.HttpRequestExecutor.doReceiveResponse(HttpRequestExecutor.java:273)
	at org.apache.http.protocol.HttpRequestExecutor.execute(HttpRequestExecutor.java:125)
	at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:272)
	at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185)
	at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
	at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
	at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108)
	at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke()
	at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689)
	at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$351fa70d.execute()
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71)
	... 61 more

2021-04-01 05:14:00.975 ERROR 1 [nio-8443-exec-7] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client:

org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106)
	at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57)
	at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67)
	at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190)
	at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138)
	at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793)
	at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
	at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040)
	at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943)
	at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
	at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:634)
	at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:741)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)
	at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Unknown Source)
Caused by: org.apache.http.NoHttpResponseException: ejbca:8080 failed to respond
	at org.apache.http.impl.conn.DefaultHttpResponseParser.parseHead(DefaultHttpResponseParser.java:141)
	at org.apache.http.impl.conn.DefaultHttpResponseParser.parseHead(DefaultHttpResponseParser.java:56)
	at org.apache.http.impl.io.AbstractMessageParser.parse(AbstractMessageParser.java:259)
	at org.apache.http.impl.DefaultBHttpClientConnection.receiveResponseHeader(DefaultBHttpClientConnection.java:163)
	at org.apache.http.impl.conn.CPoolProxy.receiveResponseHeader(CPoolProxy.java:165)
	at org.apache.http.protocol.HttpRequestExecutor.doReceiveResponse(HttpRequestExecutor.java:273)
	at org.apache.http.protocol.HttpRequestExecutor.execute(HttpRequestExecutor.java:125)
	at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:272)
	at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185)
	at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
	at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
	at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108)
	at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke()
	at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689)
	at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$351fa70d.execute()
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71)
	... 61 more

2021-04-01 05:14:04.520  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:14:04.521 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:14:04.522 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:14:04.522 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:14:04.523  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:14:04.523  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:14:04.524  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:14:04.524  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:14:04.524  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:14:04.528  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:14:04.528  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:14:04.529  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:14:04.530  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:14:05.562 ERROR 1 [nio-8443-exec-3] o.o.o.c.c.i.Cmpv2HttpClient              : IOException error Connect to ejbca:8080 [ejbca/10.233.42.1] failed: Connection refused (Connection refused), while trying to connect CA RA
2021-04-01 05:14:05.563 ERROR 1 [nio-8443-exec-3] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client:

org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106)
	at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57)
	at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67)
	at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190)
	at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138)
	at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793)
	at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
	at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040)
	at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943)
	at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
	at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:634)
	at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:741)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)
	at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Unknown Source)
Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.42.1] failed: Connection refused (Connection refused)
	at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159)
	at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373)
	at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394)
	at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237)
	at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185)
	at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
	at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
	at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108)
	at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke()
	at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689)
	at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$351fa70d.execute()
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71)
	... 61 more
Caused by: java.net.ConnectException: Connection refused (Connection refused)
	at java.base/java.net.PlainSocketImpl.socketConnect(Native Method)
	at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source)
	at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source)
	at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source)
	at java.base/java.net.SocksSocketImpl.connect(Unknown Source)
	at java.base/java.net.Socket.connect(Unknown Source)
	at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75)
	at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142)
	... 82 more

2021-04-01 05:14:52.606  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:14:52.607 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:14:52.608 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:14:52.609 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:14:52.609  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:14:52.610  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:14:52.610  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:14:52.611  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:14:52.611  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:14:52.615  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:14:52.616  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:14:52.616  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:14:52.617  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:14:53.654 ERROR 1 [nio-8443-exec-8] o.o.o.c.c.i.Cmpv2HttpClient              : IOException error Connect to ejbca:8080 [ejbca/10.233.42.1] failed: Connection refused (Connection refused), while trying to connect CA RA
2021-04-01 05:14:53.655 ERROR 1 [nio-8443-exec-8] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client:

org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106)
	at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57)
	at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67)
	at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190)
	at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138)
	at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793)
	at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
	at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040)
	at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943)
	at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
	at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:634)
	at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:741)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)
	at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Unknown Source)
Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.42.1] failed: Connection refused (Connection refused)
	at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159)
	at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373)
	at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394)
	at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237)
	at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185)
	at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
	at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
	at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108)
	at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke()
	at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689)
	at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$351fa70d.execute()
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71)
	... 61 more
Caused by: java.net.ConnectException: Connection refused (Connection refused)
	at java.base/java.net.PlainSocketImpl.socketConnect(Native Method)
	at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source)
	at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source)
	at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source)
	at java.base/java.net.SocksSocketImpl.connect(Unknown Source)
	at java.base/java.net.Socket.connect(Unknown Source)
	at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75)
	at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142)
	... 82 more

2021-04-01 05:16:24.559  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:16:24.561 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:16:24.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:16:24.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:16:24.563  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:16:24.563  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:16:24.564  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:16:24.564  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:16:24.565  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:16:24.570  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:16:24.571  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:16:24.571  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:16:24.573  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:16:25.590 ERROR 1 [nio-8443-exec-9] o.o.o.c.c.i.Cmpv2HttpClient              : IOException error Connect to ejbca:8080 [ejbca/10.233.42.1] failed: Connection refused (Connection refused), while trying to connect CA RA
2021-04-01 05:16:25.591 ERROR 1 [nio-8443-exec-9] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client:

org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106)
	at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57)
	at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67)
	at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190)
	at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138)
	at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793)
	at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
	at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040)
	at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943)
	at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
	at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:634)
	at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:741)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)
	at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Unknown Source)
Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.42.1] failed: Connection refused (Connection refused)
	at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159)
	at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373)
	at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394)
	at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237)
	at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185)
	at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
	at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
	at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108)
	at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke()
	at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689)
	at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$351fa70d.execute()
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71)
	... 61 more
Caused by: java.net.ConnectException: Connection refused (Connection refused)
	at java.base/java.net.PlainSocketImpl.socketConnect(Native Method)
	at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source)
	at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source)
	at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source)
	at java.base/java.net.SocksSocketImpl.connect(Unknown Source)
	at java.base/java.net.Socket.connect(Unknown Source)
	at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75)
	at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142)
	... 82 more

2021-04-01 05:19:16.836  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:19:16.837 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:19:16.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:19:16.839 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:19:16.839  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:19:16.840  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:19:16.840  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:19:16.841  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:19:16.841  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:19:16.846  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:19:16.847  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:19:16.847  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:19:16.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:19:17.943 ERROR 1 [nio-8443-exec-2] o.o.o.c.c.i.Cmpv2HttpClient              : IOException error Connect to ejbca:8080 [ejbca/10.233.42.1] failed: Connection refused (Connection refused), while trying to connect CA RA
2021-04-01 05:19:17.944 ERROR 1 [nio-8443-exec-2] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client:

org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:249)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:100)
	at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.createCertificate(CmpClientImpl.java:106)
	at org.onap.oom.certservice.certification.CertificationProvider.signCsr(CertificationProvider.java:57)
	at org.onap.oom.certservice.certification.CertificationModelFactory.createCertificationModel(CertificationModelFactory.java:67)
	at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:92)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:190)
	at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:138)
	at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:106)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:888)
	at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:793)
	at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
	at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1040)
	at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:943)
	at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
	at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:634)
	at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:741)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:108)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
	at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:119)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)
	at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:747)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:367)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:860)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1598)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Unknown Source)
Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.42.1] failed: Connection refused (Connection refused)
	at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159)
	at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373)
	at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394)
	at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237)
	at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185)
	at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
	at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
	at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
	at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108)
	at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke()
	at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:769)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:136)
	at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124)
	at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
	at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:747)
	at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:689)
	at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$351fa70d.execute()
	at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71)
	... 61 more
Caused by: java.net.ConnectException: Connection refused (Connection refused)
	at java.base/java.net.PlainSocketImpl.socketConnect(Native Method)
	at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source)
	at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source)
	at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source)
	at java.base/java.net.SocksSocketImpl.connect(Unknown Source)
	at java.base/java.net.Socket.connect(Unknown Source)
	at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75)
	at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142)
	... 82 more

2021-04-01 05:21:40.134  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:21:40.135 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:21:40.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-01 05:21:40.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:21:40.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-01 05:21:40.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:21:40.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:21:40.139  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:21:40.139  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:21:40.145  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:21:40.145  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:21:40.146  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:21:40.147  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:21:40.509  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-01 05:21:40.510  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-01 05:21:40.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-01 05:21:40.512 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-01 05:21:40.512  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1937
2021-04-01 05:21:40.513  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-01 05:21:40.514  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-01 05:21:40.515  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-01 05:21:40.515  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-01 05:21:40.516  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-01 05:21:40.516 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:21:40.517 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:21:40.518 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:21:40.518 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:21:40.519 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:21:40.519 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:21:40.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-01 05:21:40.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22638530990017240415944046650088981133966721636
             IssuerDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 01 03:58:07 UTC 2021
           Final Date: Tue Apr 01 03:58:07 UTC 2031
            SubjectDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:cf:33:c0:ad:86:75:fe:02:72:57:7a:fe:c1:76:2d:4b:d6:b0:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 21d367069bec8ccb363cdffc840e73aad773960f
                       f5a8ec89c8d7e0c0e95f5de37421833a5d22a733
                       044b06cb4ed682bbffd14354bb8f678147732722
                       fd5fc7dd7ef2aafd4b2f01f881acaaa3457a7be1
                       0d0078da002efa307519248839f3bcefe22d9dcd
                       795f09e1356ad1b9309a46f106e89070e68c4e35
                       7412d1d5c1913aa40e9e43186bdbda2332643711
                       1f14390db543b03a79971daeafe22156d506a6d0
                       af4cb5fd0379eeef8e78dbd3723e1fce34cbfb68
                       a19b64f6ae108c4d1b112c9790964dcfdbdd7135
                       39989ae59a41c8da70c4d1a389c98094ff363233
                       a9ca684af49ce4aaa6c7f14e594b8dbfc00ae176
                       baca7a56203dbcce58d9145bb9f991a0628d9549
                       ad8d21e9b1db8dc9be1af3398869434d0a4137e4
                       e6a56702d6a3dea62073ab59a54ede6e20058b2a
                       95582014b0167799db28f2ddabd00c05dba43562
                       dfd14887866a62e1db006432db8982c5de3ff847
                       626ec08e43158f4051943ee45e3354af047ceca7
                       6d04213f2f97c69f81d4f7140d80dba8a41a1c7d
                       7ed2f0e9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2f:ac:bf:d4:e9:4e:1a:bf:fe:34:73:85:6a:cd:e0:e2:ea:85:51:ee]
            modulus: 8ccd0be56b72299c2016da0aeba690117a39b00f7705b98462d2f3c51f56cd1aabfc2f17b31ffb9adc884d7c13a941a07d92b9b8aa1c87e88e9d664446cd215d5129ddc3743a5003edacf114cbb39d774e815dbc66fbb8df5801e5e8b614ae3df380d46b4e5ee15cb9696bda74b7f38c3cf0c728cc7c9ce517da9bdc0210f075313410fee0248d957220451a72ebe60e9493400589ca3502eb88fd811245a3b164c5205a36f21a210bf7ebc98cf2bebcb9d1c2f781ae1e9b3c825a40ff26043f5a9ce6a5c83ca48eb88fe2b66a0cd259355e249cf5bc7e8f87bb11ea4e87079345917a9493c74239e689a6c4778156579ebcdb0ee2cebf9aca0559aebc0f69d1
    public exponent: 10001

] 
2021-04-01 05:24:26.945  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:24:26.947 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:24:26.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:24:26.950 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:24:26.950  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:24:26.951  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:24:26.951  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:24:26.951  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:24:26.952  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:24:26.956  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:24:26.957  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:24:26.957  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:24:26.959  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:24:27.202  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-01 05:24:27.202  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-01 05:24:27.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-01 05:24:27.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-01 05:24:27.204  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1937
2021-04-01 05:24:27.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-01 05:24:27.206  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-01 05:24:27.206  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-01 05:24:27.207  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-01 05:24:27.207  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-01 05:24:27.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:24:27.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:24:27.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:24:27.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:24:27.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:24:27.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:24:27.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-01 05:24:27.213 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22638530990017240415944046650088981133966721636
             IssuerDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 01 03:58:07 UTC 2021
           Final Date: Tue Apr 01 03:58:07 UTC 2031
            SubjectDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:cf:33:c0:ad:86:75:fe:02:72:57:7a:fe:c1:76:2d:4b:d6:b0:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 21d367069bec8ccb363cdffc840e73aad773960f
                       f5a8ec89c8d7e0c0e95f5de37421833a5d22a733
                       044b06cb4ed682bbffd14354bb8f678147732722
                       fd5fc7dd7ef2aafd4b2f01f881acaaa3457a7be1
                       0d0078da002efa307519248839f3bcefe22d9dcd
                       795f09e1356ad1b9309a46f106e89070e68c4e35
                       7412d1d5c1913aa40e9e43186bdbda2332643711
                       1f14390db543b03a79971daeafe22156d506a6d0
                       af4cb5fd0379eeef8e78dbd3723e1fce34cbfb68
                       a19b64f6ae108c4d1b112c9790964dcfdbdd7135
                       39989ae59a41c8da70c4d1a389c98094ff363233
                       a9ca684af49ce4aaa6c7f14e594b8dbfc00ae176
                       baca7a56203dbcce58d9145bb9f991a0628d9549
                       ad8d21e9b1db8dc9be1af3398869434d0a4137e4
                       e6a56702d6a3dea62073ab59a54ede6e20058b2a
                       95582014b0167799db28f2ddabd00c05dba43562
                       dfd14887866a62e1db006432db8982c5de3ff847
                       626ec08e43158f4051943ee45e3354af047ceca7
                       6d04213f2f97c69f81d4f7140d80dba8a41a1c7d
                       7ed2f0e9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:bc:80:05:9c:05:66:e0:58:c4:e2:94:60:b8:f4:ae:69:15:06:3b]
            modulus: 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
    public exponent: 10001

] 
2021-04-01 05:26:01.714  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:26:01.715 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:26:01.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-01 05:26:01.717 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:26:01.717  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-01 05:26:01.717  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:26:01.718  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:26:01.718  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:26:01.718  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:26:01.722  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:26:01.723  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:26:01.723  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:26:01.724  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:26:01.890  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-01 05:26:01.891  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-01 05:26:01.891 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-01 05:26:01.893 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-01 05:26:01.893  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1937
2021-04-01 05:26:01.893  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-01 05:26:01.895  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-01 05:26:01.895  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-01 05:26:01.895  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-01 05:26:01.896  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-01 05:26:01.896 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:26:01.896 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:26:01.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:26:01.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:26:01.897 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:26:01.898 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:26:01.898 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-01 05:26:01.901 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22638530990017240415944046650088981133966721636
             IssuerDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 01 03:58:07 UTC 2021
           Final Date: Tue Apr 01 03:58:07 UTC 2031
            SubjectDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:cf:33:c0:ad:86:75:fe:02:72:57:7a:fe:c1:76:2d:4b:d6:b0:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 21d367069bec8ccb363cdffc840e73aad773960f
                       f5a8ec89c8d7e0c0e95f5de37421833a5d22a733
                       044b06cb4ed682bbffd14354bb8f678147732722
                       fd5fc7dd7ef2aafd4b2f01f881acaaa3457a7be1
                       0d0078da002efa307519248839f3bcefe22d9dcd
                       795f09e1356ad1b9309a46f106e89070e68c4e35
                       7412d1d5c1913aa40e9e43186bdbda2332643711
                       1f14390db543b03a79971daeafe22156d506a6d0
                       af4cb5fd0379eeef8e78dbd3723e1fce34cbfb68
                       a19b64f6ae108c4d1b112c9790964dcfdbdd7135
                       39989ae59a41c8da70c4d1a389c98094ff363233
                       a9ca684af49ce4aaa6c7f14e594b8dbfc00ae176
                       baca7a56203dbcce58d9145bb9f991a0628d9549
                       ad8d21e9b1db8dc9be1af3398869434d0a4137e4
                       e6a56702d6a3dea62073ab59a54ede6e20058b2a
                       95582014b0167799db28f2ddabd00c05dba43562
                       dfd14887866a62e1db006432db8982c5de3ff847
                       626ec08e43158f4051943ee45e3354af047ceca7
                       6d04213f2f97c69f81d4f7140d80dba8a41a1c7d
                       7ed2f0e9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1e:94:78:29:58:cb:78:7d:6b:55:ba:8e:c0:d8:64:8b:f6:6d:15:ea]
            modulus: 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
    public exponent: 10001

] 
2021-04-01 05:27:31.650  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:27:31.652 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:27:31.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-01 05:27:31.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:27:31.653  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-01 05:27:31.654  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:27:31.654  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:27:31.654  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:27:31.655  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:27:31.658  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:27:31.659  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:27:31.659  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:27:31.661  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:27:31.758  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-01 05:27:31.759  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-01 05:27:31.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-01 05:27:31.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-01 05:27:31.761  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1937
2021-04-01 05:27:31.761  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-01 05:27:31.762  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-01 05:27:31.762  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-01 05:27:31.763  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-01 05:27:31.763  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-01 05:27:31.763 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:27:31.763 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:27:31.764 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:27:31.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:27:31.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:27:31.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:27:31.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-01 05:27:31.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22638530990017240415944046650088981133966721636
             IssuerDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 01 03:58:07 UTC 2021
           Final Date: Tue Apr 01 03:58:07 UTC 2031
            SubjectDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:cf:33:c0:ad:86:75:fe:02:72:57:7a:fe:c1:76:2d:4b:d6:b0:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 21d367069bec8ccb363cdffc840e73aad773960f
                       f5a8ec89c8d7e0c0e95f5de37421833a5d22a733
                       044b06cb4ed682bbffd14354bb8f678147732722
                       fd5fc7dd7ef2aafd4b2f01f881acaaa3457a7be1
                       0d0078da002efa307519248839f3bcefe22d9dcd
                       795f09e1356ad1b9309a46f106e89070e68c4e35
                       7412d1d5c1913aa40e9e43186bdbda2332643711
                       1f14390db543b03a79971daeafe22156d506a6d0
                       af4cb5fd0379eeef8e78dbd3723e1fce34cbfb68
                       a19b64f6ae108c4d1b112c9790964dcfdbdd7135
                       39989ae59a41c8da70c4d1a389c98094ff363233
                       a9ca684af49ce4aaa6c7f14e594b8dbfc00ae176
                       baca7a56203dbcce58d9145bb9f991a0628d9549
                       ad8d21e9b1db8dc9be1af3398869434d0a4137e4
                       e6a56702d6a3dea62073ab59a54ede6e20058b2a
                       95582014b0167799db28f2ddabd00c05dba43562
                       dfd14887866a62e1db006432db8982c5de3ff847
                       626ec08e43158f4051943ee45e3354af047ceca7
                       6d04213f2f97c69f81d4f7140d80dba8a41a1c7d
                       7ed2f0e9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:69:58:20:21:7b:73:d8:0f:7c:f5:57:83:7c:b7:f3:a5:cf:67:84]
            modulus: 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
    public exponent: 10001

] 
2021-04-01 05:33:44.956  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:33:44.957 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:33:44.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-01 05:33:44.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:33:44.960  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-01 05:33:44.960  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:33:44.960  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:33:44.961  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:33:44.961  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:33:44.966  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:33:44.967  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:33:44.967  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:33:44.968  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:33:45.217  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-01 05:33:45.218  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-01 05:33:45.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-01 05:33:45.219 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-01 05:33:45.220  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1937
2021-04-01 05:33:45.220  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-01 05:33:45.221  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-01 05:33:45.221  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-01 05:33:45.222  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-01 05:33:45.222  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-01 05:33:45.222 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:33:45.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:33:45.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:33:45.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:33:45.223 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:33:45.224 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:33:45.224 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-01 05:33:45.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22638530990017240415944046650088981133966721636
             IssuerDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 01 03:58:07 UTC 2021
           Final Date: Tue Apr 01 03:58:07 UTC 2031
            SubjectDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:cf:33:c0:ad:86:75:fe:02:72:57:7a:fe:c1:76:2d:4b:d6:b0:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 21d367069bec8ccb363cdffc840e73aad773960f
                       f5a8ec89c8d7e0c0e95f5de37421833a5d22a733
                       044b06cb4ed682bbffd14354bb8f678147732722
                       fd5fc7dd7ef2aafd4b2f01f881acaaa3457a7be1
                       0d0078da002efa307519248839f3bcefe22d9dcd
                       795f09e1356ad1b9309a46f106e89070e68c4e35
                       7412d1d5c1913aa40e9e43186bdbda2332643711
                       1f14390db543b03a79971daeafe22156d506a6d0
                       af4cb5fd0379eeef8e78dbd3723e1fce34cbfb68
                       a19b64f6ae108c4d1b112c9790964dcfdbdd7135
                       39989ae59a41c8da70c4d1a389c98094ff363233
                       a9ca684af49ce4aaa6c7f14e594b8dbfc00ae176
                       baca7a56203dbcce58d9145bb9f991a0628d9549
                       ad8d21e9b1db8dc9be1af3398869434d0a4137e4
                       e6a56702d6a3dea62073ab59a54ede6e20058b2a
                       95582014b0167799db28f2ddabd00c05dba43562
                       dfd14887866a62e1db006432db8982c5de3ff847
                       626ec08e43158f4051943ee45e3354af047ceca7
                       6d04213f2f97c69f81d4f7140d80dba8a41a1c7d
                       7ed2f0e9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:e3:d3:a5:48:c8:3d:89:19:a1:23:22:f7:7b:da:c8:db:d5:15:cb]
            modulus: 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
    public exponent: 10001

] 
2021-04-01 05:35:20.727  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:35:20.728 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:35:20.729 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-01 05:35:20.730 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:35:20.730  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-01 05:35:20.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:35:20.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:35:20.732  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:35:20.732  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:35:20.739  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:35:20.739  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:35:20.740  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:35:20.742  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:35:20.862  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-01 05:35:20.863  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-01 05:35:20.863 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-01 05:35:20.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-01 05:35:20.864  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1937
2021-04-01 05:35:20.866  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-01 05:35:20.867  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-01 05:35:20.867  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-01 05:35:20.868  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-01 05:35:20.868  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-01 05:35:20.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:35:20.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:35:20.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:35:20.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:35:20.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:35:20.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:35:20.871 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-01 05:35:20.873 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22638530990017240415944046650088981133966721636
             IssuerDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 01 03:58:07 UTC 2021
           Final Date: Tue Apr 01 03:58:07 UTC 2031
            SubjectDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:cf:33:c0:ad:86:75:fe:02:72:57:7a:fe:c1:76:2d:4b:d6:b0:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 21d367069bec8ccb363cdffc840e73aad773960f
                       f5a8ec89c8d7e0c0e95f5de37421833a5d22a733
                       044b06cb4ed682bbffd14354bb8f678147732722
                       fd5fc7dd7ef2aafd4b2f01f881acaaa3457a7be1
                       0d0078da002efa307519248839f3bcefe22d9dcd
                       795f09e1356ad1b9309a46f106e89070e68c4e35
                       7412d1d5c1913aa40e9e43186bdbda2332643711
                       1f14390db543b03a79971daeafe22156d506a6d0
                       af4cb5fd0379eeef8e78dbd3723e1fce34cbfb68
                       a19b64f6ae108c4d1b112c9790964dcfdbdd7135
                       39989ae59a41c8da70c4d1a389c98094ff363233
                       a9ca684af49ce4aaa6c7f14e594b8dbfc00ae176
                       baca7a56203dbcce58d9145bb9f991a0628d9549
                       ad8d21e9b1db8dc9be1af3398869434d0a4137e4
                       e6a56702d6a3dea62073ab59a54ede6e20058b2a
                       95582014b0167799db28f2ddabd00c05dba43562
                       dfd14887866a62e1db006432db8982c5de3ff847
                       626ec08e43158f4051943ee45e3354af047ceca7
                       6d04213f2f97c69f81d4f7140d80dba8a41a1c7d
                       7ed2f0e9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:11:6d:93:78:f3:bf:79:0e:dd:18:1a:c5:76:f5:c4:67:6a:e7:07]
            modulus: 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
    public exponent: 10001

] 
2021-04-01 05:36:54.206  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-01 05:36:54.207 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-01 05:36:54.208 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:36:54.208 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-01 05:36:54.208  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-01 05:36:54.209  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-01 05:36:54.209  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-01 05:36:54.209  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-01 05:36:54.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-01 05:36:54.213  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-01 05:36:54.214  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:36:54.214  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-01 05:36:54.215  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-01 05:36:54.333  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-01 05:36:54.334  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-01 05:36:54.334 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-01 05:36:54.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-01 05:36:54.335  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1937
2021-04-01 05:36:54.336  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-01 05:36:54.337  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-01 05:36:54.337  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-01 05:36:54.337  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-01 05:36:54.338  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-01 05:36:54.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:36:54.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:36:54.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:36:54.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-01 05:36:54.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-01 05:36:54.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-01 05:36:54.340 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-01 05:36:54.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 22638530990017240415944046650088981133966721636
             IssuerDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 01 03:58:07 UTC 2021
           Final Date: Tue Apr 01 03:58:07 UTC 2031
            SubjectDN: UID=c-05a34b3b2e329fc4e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [44:cf:33:c0:ad:86:75:fe:02:72:57:7a:fe:c1:76:2d:4b:d6:b0:45]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 21d367069bec8ccb363cdffc840e73aad773960f
                       f5a8ec89c8d7e0c0e95f5de37421833a5d22a733
                       044b06cb4ed682bbffd14354bb8f678147732722
                       fd5fc7dd7ef2aafd4b2f01f881acaaa3457a7be1
                       0d0078da002efa307519248839f3bcefe22d9dcd
                       795f09e1356ad1b9309a46f106e89070e68c4e35
                       7412d1d5c1913aa40e9e43186bdbda2332643711
                       1f14390db543b03a79971daeafe22156d506a6d0
                       af4cb5fd0379eeef8e78dbd3723e1fce34cbfb68
                       a19b64f6ae108c4d1b112c9790964dcfdbdd7135
                       39989ae59a41c8da70c4d1a389c98094ff363233
                       a9ca684af49ce4aaa6c7f14e594b8dbfc00ae176
                       baca7a56203dbcce58d9145bb9f991a0628d9549
                       ad8d21e9b1db8dc9be1af3398869434d0a4137e4
                       e6a56702d6a3dea62073ab59a54ede6e20058b2a
                       95582014b0167799db28f2ddabd00c05dba43562
                       dfd14887866a62e1db006432db8982c5de3ff847
                       626ec08e43158f4051943ee45e3354af047ceca7
                       6d04213f2f97c69f81d4f7140d80dba8a41a1c7d
                       7ed2f0e9
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:fd:40:30:b2:7d:0f:34:0f:63:37:99:c0:77:10:5d:fc:c4:8d:75]
            modulus: 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
    public exponent: 10001

]