2021-04-09 16:18:45,671 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-04-09 16:18:49,260 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-04-09 16:18:52.056  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-04-09 16:19:03.465 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-04-09 16:19:04.456  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-04-09 16:19:05.071  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-04-09 16:19:18.277  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 34.705 seconds (JVM running for 41.006) 2021-04-09 16:33:30.855  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 16:33:30.865 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 16:33:30.978 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-09 16:33:30.982 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 16:33:31.065  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-09 16:33:31.068  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 16:33:31.073  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 16:33:31.073  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 16:33:31.074  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 16:33:31.159  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 16:33:31.164  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 16:33:31.277  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 16:33:31.359  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 16:33:31.360  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 16:33:31.376  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 16:33:32.605  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 16:33:32.609  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 16:33:32.609 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 16:33:32.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 16:33:32.658  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 16:33:32.658  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 16:33:32.662  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 16:33:32.662  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 16:33:32.669  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 16:33:32.670  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 16:33:32.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 16:33:32.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 16:33:32.671 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 16:33:32.764 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 16:33:32.764 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 16:33:32.765 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 16:33:32.771 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 16:33:32.956 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:3c:95:95:d7:c0:f6:1b:8a:86:59:d0:7b:5a:d0:30:e2:0c:a5:13] modulus: 8f4772dad2b32e7643e4d855605db9d1bb3379124029b6fd708fa7c609649830b818eaf6045f9e87cc53c0cbf6c6a6fc84bcafa1d825a40c71f7543a4f4816fcea29d535d83c1e735e852a7c9076d39fdf8e1ea4ddf4f78708787d288e27817a203cad2afb74d68e46328e0cf65ed90db7aee8b5fd18af4f46b5b537237238ab941a6f9ec1546877ba39a591fbd63ccac87d958db73d3d982eabe5f0961041af3434a57c6bd0bfea634ef45b6a8ac7f33998d1f227e8c163b4c1aa7a0ac17ffbb664190f6e859fb53e88ccf7d86b02d87e6d9cfd3f95486546f8b9697b13c7020c5f83f7c29da7fc9d4213ff75695a93c1eaf7ff97856ce4f1b345cbfea481e7 public exponent: 10001 ] 2021-04-09 17:57:46.643  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 17:57:46.644 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 17:57:46.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 17:57:46.648 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 17:57:46.649  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 17:57:46.655  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 17:57:46.655  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 17:57:46.656  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 17:57:46.656  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 17:57:46.666  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 17:57:46.667  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 17:57:46.667  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 17:57:46.672  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 17:57:46.896  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 17:57:46.897  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 17:57:46.898 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 17:57:46.902 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 17:57:46.903  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 17:57:46.903  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 17:57:46.907  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 17:57:46.955  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 17:57:46.956  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 17:57:46.956  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 17:57:46.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 17:57:46.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 17:57:46.958 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 17:57:46.959 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 17:57:46.959 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 17:57:46.960 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 17:57:46.961 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 17:57:46.966 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:3d:08:7f:5b:de:1e:1f:83:85:00:0d:0a:21:1d:04:25:34:d3:90] modulus: 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 public exponent: 10001 ] 2021-04-09 17:59:17.060  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 17:59:17.061 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 17:59:17.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-09 17:59:17.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 17:59:17.063  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-09 17:59:17.063  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 17:59:17.064  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 17:59:17.064  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 17:59:17.065  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 17:59:17.069  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 17:59:17.070  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 17:59:17.070  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 17:59:17.072  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 17:59:17.267  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 17:59:17.268  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 17:59:17.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 17:59:17.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 17:59:17.271  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 17:59:17.272  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 17:59:17.273  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 17:59:17.274  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 17:59:17.274  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 17:59:17.275  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 17:59:17.275 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 17:59:17.275 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 17:59:17.276 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 17:59:17.276 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 17:59:17.277 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 17:59:17.277 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 17:59:17.278 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 17:59:17.280 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:0c:45:65:1f:57:4c:2c:96:3e:71:c3:f3:53:52:90:53:f9:e7:f9] modulus: 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 public exponent: 10001 ] 2021-04-09 18:02:19.279  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:02:19.281 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:02:19.282 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-09 18:02:19.283 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:02:19.283  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-09 18:02:19.284  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:02:19.284  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:02:19.284  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:02:19.285  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:02:19.289  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:02:19.290  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:02:19.290  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:02:19.291  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:02:19.474  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:02:19.475  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:02:19.476 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:02:19.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:02:19.478  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:02:19.478  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:02:19.479  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:02:19.480  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:02:19.480  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:02:19.481  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:02:19.481 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:02:19.481 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:02:19.482 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:02:19.482 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:02:19.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:02:19.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:02:19.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:02:19.487 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: a02a80ff0a054e6b77acc7d1ae0998feca9c2e10f39c6fc13a3c1834c0b9afd983240ddb5cec38940a79f6a7d6c346edd26915c62da55b1eb4938677612470dbfca0ce7ee2a6ad5e050b97b21723c909648e9c8a7b14d591c5228e056f3df465ed1e16cb981d4abf980d0c941e6f5c6e628f9a9b05bdac102bea7952602832b6e38cb3f27e57f823274ea9635254d17f91b9551e4c5a71bed6d94575280661617deb11d037771ace725576bf120431e606133282a779f55856eacdeb0c99c0dec0b30a2124a622d6607569549d6c7218115c1e7c9ff8cdba4baf68d9bd4b4bdfc32b53749c09775af4fb1d7f8a34f2b20de75370f2cfdc67e566644852ce992813bd695b652e562b3f604df115a58b25387d0f90fd6fe2da33df4cce9415867838cf0fead424e9b8fcb68a313d7ce27a7833193aaeed2d9212088c06e16e9ebdd42d8b7e25d457537643efab6906fb2c8bcd67086c7573fdcc1b3d3a1d54acbd1b0ff857727bd684afd5c9c9bc22f6654447f0e0f5af2a680edaf2b7f9e8dce7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:ed:30:4b:e9:75:8b:27:00:09:5e:ca:61:68:df:05:c4:f2:25:fd] modulus: 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 public exponent: 10001 ] 2021-04-09 18:02:47.405  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:02:47.406 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:02:47.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-09 18:02:47.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:02:47.408  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-09 18:02:47.409  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:02:47.409  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:02:47.409  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:02:47.410  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:02:47.414  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:02:47.414  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:02:47.414  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:02:47.416  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:02:47.515  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:02:47.516  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:02:47.516 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:02:47.555 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:02:47.556  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:02:47.556  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:02:47.558  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:02:47.558  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:02:47.559  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:02:47.559  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:02:47.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:02:47.560 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:02:47.560 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:02:47.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:02:47.561 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:02:47.562 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:02:47.562 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:02:47.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:ed:54:79:ae:a4:51:6e:ef:49:2d:03:76:51:d6:2f:10:43:ad:ce] modulus: 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 public exponent: 10001 ] 2021-04-09 18:02:54.923  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:02:54.924 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:02:54.925 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-09 18:02:54.926 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:02:54.926  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-09 18:02:54.926  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:02:54.927  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:02:54.927  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:02:54.927  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:02:54.958  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:02:54.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:02:54.959  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:02:54.961  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:02:55.055  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:02:55.055  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:02:55.056 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:02:55.057 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:02:55.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:02:55.058  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:02:55.059  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:02:55.059  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:02:55.060  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:02:55.060  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:02:55.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:02:55.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:02:55.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:02:55.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:02:55.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:02:55.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:02:55.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:02:55.066 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:5f:de:94:9c:89:8f:d1:1f:53:e4:98:c5:5b:77:e9:9f:1b:2b:85] modulus: 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 public exponent: 10001 ] 2021-04-09 18:03:45.604  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:03:45.605 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:03:45.656 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-09 18:03:45.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:03:45.658  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-09 18:03:45.658  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:03:45.659  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:03:45.659  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:03:45.659  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:03:45.664  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:03:45.664  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:03:45.665  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:03:45.667  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:03:45.865  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:03:45.865  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:03:45.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:03:45.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:03:45.868  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:03:45.868  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:03:45.869  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:03:45.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:03:45.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:03:45.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:03:45.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:03:45.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:03:45.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:03:45.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:03:45.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:03:45.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:03:45.873 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:03:45.876 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: a02a80ff0a054e6b77acc7d1ae0998feca9c2e10f39c6fc13a3c1834c0b9afd983240ddb5cec38940a79f6a7d6c346edd26915c62da55b1eb4938677612470dbfca0ce7ee2a6ad5e050b97b21723c909648e9c8a7b14d591c5228e056f3df465ed1e16cb981d4abf980d0c941e6f5c6e628f9a9b05bdac102bea7952602832b6e38cb3f27e57f823274ea9635254d17f91b9551e4c5a71bed6d94575280661617deb11d037771ace725576bf120431e606133282a779f55856eacdeb0c99c0dec0b30a2124a622d6607569549d6c7218115c1e7c9ff8cdba4baf68d9bd4b4bdfc32b53749c09775af4fb1d7f8a34f2b20de75370f2cfdc67e566644852ce992813bd695b652e562b3f604df115a58b25387d0f90fd6fe2da33df4cce9415867838cf0fead424e9b8fcb68a313d7ce27a7833193aaeed2d9212088c06e16e9ebdd42d8b7e25d457537643efab6906fb2c8bcd67086c7573fdcc1b3d3a1d54acbd1b0ff857727bd684afd5c9c9bc22f6654447f0e0f5af2a680edaf2b7f9e8dce7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:af:18:f5:4b:c2:84:68:16:23:92:4d:88:07:24:47:25:88:b3:7a] modulus: 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 public exponent: 10001 ] 2021-04-09 18:04:25.320  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:04:25.321 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:04:25.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-09 18:04:25.323 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:04:25.323  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-09 18:04:25.324  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:04:25.324  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:04:25.324  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:04:25.324  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:04:25.328  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:04:25.329  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:04:25.329  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:04:25.330  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:04:25.456  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:04:25.456  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:04:25.456 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:04:25.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:04:25.458  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:04:25.458  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:04:25.460  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:04:25.461  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:04:25.462  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:04:25.462  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:04:25.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:04:25.463 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:04:25.463 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:04:25.463 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:04:25.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:04:25.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:04:25.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:04:25.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:fd:35:8b:38:ef:c5:b7:16:5b:0f:05:ff:b1:b9:ff:f2:9e:0a:80] modulus: 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 public exponent: 10001 ] 2021-04-09 18:08:19.202  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:08:19.203 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:08:19.204 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 18:08:19.205 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:08:19.205  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 18:08:19.206  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:08:19.206  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:08:19.206  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:08:19.207  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:08:19.211  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:08:19.212  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:08:19.212  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:08:19.214  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:08:19.323  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:08:19.324  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:08:19.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:08:19.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:08:19.356  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:08:19.356  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:08:19.357  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:08:19.358  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:08:19.358  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:08:19.358  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:08:19.358 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:08:19.359 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:08:19.359 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:08:19.359 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:08:19.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:08:19.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:08:19.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:08:19.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:85:f8:30:82:f8:57:68:10:9d:45:82:d7:a7:76:ee:68:9d:e8:1c] modulus: 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 public exponent: 10001 ] 2021-04-09 18:12:13.831  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:12:13.832 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:12:13.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-09 18:12:13.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:12:13.834  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-09 18:12:13.834  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:12:13.834  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:12:13.835  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:12:13.835  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:12:13.839  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:12:13.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:12:13.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:12:13.841  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:12:13.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:12:13.951  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:12:13.951 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:12:13.953 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:12:13.953  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:12:13.954  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:12:13.955  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:12:13.955  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:12:13.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:12:13.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:12:13.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:12:13.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:12:13.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:12:13.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:12:13.958 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:12:13.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:12:13.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:12:13.962 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:5c:54:ea:6a:26:82:73:42:4c:56:07:10:82:9a:d1:f7:83:f2:ff] modulus: 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 public exponent: 10001 ] 2021-04-09 18:12:45.992  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:12:45.993 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:12:45.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-09 18:12:45.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:12:45.994  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-09 18:12:45.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:12:45.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:12:45.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:12:45.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:12:45.999  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:12:45.999  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:12:46.000  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:12:46.001  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:12:46.137  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:12:46.138  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:12:46.138 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:12:46.139 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:12:46.139  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:12:46.140  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:12:46.141  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:12:46.141  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:12:46.142  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:12:46.142  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:12:46.142 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:12:46.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:12:46.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:12:46.146 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:12:46.146 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:12:46.146 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:12:46.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:12:46.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:8d:bd:de:bb:84:1b:df:b7:11:0a:8e:21:24:53:cb:83:b8:50:82] modulus: 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 public exponent: 10001 ] 2021-04-09 18:13:17.005  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:13:17.006 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:13:17.008 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-09 18:13:17.009 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:13:17.009  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-09 18:13:17.010  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:13:17.010  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:13:17.010  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:13:17.011  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:13:17.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:13:17.018  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:13:17.018  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:13:17.020  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:13:17.110  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:13:17.111  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:13:17.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:13:17.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:13:17.113  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:13:17.113  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:13:17.114  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:13:17.114  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:13:17.115  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:13:17.115  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:13:17.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:13:17.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:13:17.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:13:17.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:13:17.117 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:13:17.117 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:13:17.118 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:13:17.120 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7f:7f:30:75:bf:ed:4c:68:9b:fa:70:29:6c:ac:48:eb:d3:5e:77:c8] modulus: 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 public exponent: 10001 ] 2021-04-09 18:15:02.345  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:15:02.346 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:15:02.347 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-09 18:15:02.348 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:15:02.348  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-09 18:15:02.349  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:15:02.349  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:15:02.349  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:15:02.350  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:15:02.356  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:15:02.357  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:15:02.357  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:15:02.359  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:15:02.445  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:15:02.445  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:15:02.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:15:02.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:15:02.456  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:15:02.456  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:15:02.457  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:15:02.458  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:15:02.458  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:15:02.458  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:15:02.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:15:02.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:15:02.459 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:15:02.459 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:15:02.459 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:15:02.459 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:15:02.460 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:15:02.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cd:be:32:f6:09:c6:1d:ce:fb:eb:cb:bb:e7:71:84:7a:ee:af:9e:7c] modulus: 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 public exponent: 10001 ] 2021-04-09 18:16:36.507  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:16:36.508 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:16:36.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 18:16:36.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:16:36.510  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 18:16:36.511  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:16:36.511  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:16:36.511  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:16:36.512  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:16:36.517  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:16:36.517  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:16:36.517  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:16:36.519  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:16:36.625  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:16:36.625  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:16:36.626 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:16:36.627 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:16:36.627  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:16:36.628  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:16:36.629  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:16:36.629  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:16:36.629  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:16:36.630  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:16:36.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:16:36.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:16:36.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:16:36.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:16:36.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:16:36.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:16:36.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:16:36.634 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:86:4b:1d:0f:e1:69:4e:1b:8f:39:5f:38:1b:33:61:3a:21:4c:9e] modulus: 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 public exponent: 10001 ] 2021-04-09 18:19:53.276  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:19:53.277 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:19:53.279 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 18:19:53.280 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:19:53.280  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 18:19:53.280  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:19:53.281  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:19:53.281  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:19:53.282  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:19:53.286  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:19:53.286  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:19:53.287  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:19:53.288  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:19:53.413  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:19:53.414  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:19:53.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:19:53.416 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:19:53.417  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:19:53.417  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:19:53.419  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:19:53.419  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:19:53.420  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:19:53.420  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:19:53.420 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:19:53.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:19:53.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:19:53.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:19:53.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:19:53.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:19:53.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:19:53.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ff:47:8c:43:d0:5b:e3:7a:1e:70:58:29:e0:19:fd:6e:3c:d8:45:27] modulus: d38056663cf685f17623cef2fd5fd02057f75a25f7bbc9d7c3d35f58e8959407fb2efd8a16e1ae5e98b162feac480bcd822bc19aea317db2f864f026e6027fe820a6e19521cd4bbb281ef9c1eed8e9901fd8c855c5ab6cf9506eb66766b347834d88f7ba46f14602872efdba03d0bdc8050176548c145984f7d455d2262741f00f262f36e6430d2f2a7c241b12f61bded5123765aa7a3bfa20e3203fc0829d8c8bce4632e3c1be7968af5c9c96149a227bba5cf1d45fb84cf6ad1d9d0b3f805265fdf2ed6e9ca63840aee0fbc1f55780bce5615c293c80031943239069d896c8050b31a32e9e793b2fb3a1925f2bd67551f65a0037308c0f703347b2a1fa8dfd public exponent: 10001 ] 2021-04-09 18:21:43.504  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:21:43.505 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:21:43.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 18:21:43.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:21:43.507  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 18:21:43.507  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:21:43.507  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:21:43.508  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:21:43.508  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:21:43.512  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:21:43.512  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:21:43.513  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:21:43.514  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:21:43.627  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:21:43.627  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:21:43.628 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:21:43.629 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:21:43.629  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:21:43.629  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:21:43.631  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:21:43.631  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:21:43.631  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:21:43.632  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:21:43.632 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:21:43.632 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:21:43.632 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:21:43.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:21:43.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:21:43.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:21:43.633 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:21:43.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:2c:3c:e1:16:ba:1f:db:03:1d:ee:5e:1e:b0:df:51:c5:cc:6d:4c] modulus: 83f4d06b6bef094b4fe0b31d7b36c9ecf03803c55846c2a9e00eb14aaad49b6a05a29ce8e4d37bd0b9d43fa4706ccc189b9cbda02c6f6689ceefd51d706d476b6a7d1d83060a13dfb54ff61a0a4e34b2b900fd3cedb1f64ac4f4f7a1df78bfd5b301b0d87104b7d552aa749d0d471102e2de6a889f130b87c5c50bb535935d2bc58454bbec73035beba4eaeec3b86e9444b569efa5340ec7051c6ff43443e12bf8f4119452a50c2deb5f7626e2e626080cc0232aa65710e899accb1ed60b3abf0a7bd34dea477ff4cfc432b5ddd54d5414203b27187afab144b2fbbd5fff28ab10d680ffc7110e60c6bc2683bede73c64fa86f80d902bac0a3904b7d186f5171 public exponent: 10001 ] 2021-04-09 18:23:22.757  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-09 18:23:22.758 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-09 18:23:22.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 18:23:22.760 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-09 18:23:22.760  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-09 18:23:22.760  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-09 18:23:22.763  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-09 18:23:22.763  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-09 18:23:22.763  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-09 18:23:22.767  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-09 18:23:22.768  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:23:22.768  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-09 18:23:22.769  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-09 18:23:22.875  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-09 18:23:22.876  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-09 18:23:22.876 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-09 18:23:22.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-09 18:23:22.877  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1927 2021-04-09 18:23:22.877  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-09 18:23:22.879  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-09 18:23:22.879  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-09 18:23:22.879  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-09 18:23:22.880  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-09 18:23:22.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:23:22.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:23:22.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:23:22.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-09 18:23:22.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-09 18:23:22.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-09 18:23:22.882 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-09 18:23:22.885 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 580152603674508182490304215324768754817856140172 IssuerDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 09 16:15:27 UTC 2021 Final Date: Wed Apr 09 16:15:27 UTC 2031 SubjectDN: UID=c-07459412243a7a1a3,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a4:23:8d:bf:a4:74:6e:45:4c:6b:25:31:8e:54:4a:6d:f3:8e:09:99] modulus: a02a80ff0a054e6b77acc7d1ae0998feca9c2e10f39c6fc13a3c1834c0b9afd983240ddb5cec38940a79f6a7d6c346edd26915c62da55b1eb4938677612470dbfca0ce7ee2a6ad5e050b97b21723c909648e9c8a7b14d591c5228e056f3df465ed1e16cb981d4abf980d0c941e6f5c6e628f9a9b05bdac102bea7952602832b6e38cb3f27e57f823274ea9635254d17f91b9551e4c5a71bed6d94575280661617deb11d037771ace725576bf120431e606133282a779f55856eacdeb0c99c0dec0b30a2124a622d6607569549d6c7218115c1e7c9ff8cdba4baf68d9bd4b4bdfc32b53749c09775af4fb1d7f8a34f2b20de75370f2cfdc67e566644852ce992813bd695b652e562b3f604df115a58b25387d0f90fd6fe2da33df4cce9415867838cf0fead424e9b8fcb68a313d7ce27a7833193aaeed2d9212088c06e16e9ebdd42d8b7e25d457537643efab6906fb2c8bcd67086c7573fdcc1b3d3a1d54acbd1b0ff857727bd684afd5c9c9bc22f6654447f0e0f5af2a680edaf2b7f9e8dce7 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 672a7c86f80236ed6ee0c06992b4b2cb4674e683 24571f52ad111b54c0cc6e347b5f4ea0ee8063ce 0e3a795f5322e7d25c3925fd0e94016cd2c183fb 18c9a99874eea718f278b4602815fbd7ecd56457 dce58169ec0ec519bcca5bb06875f62c0141456b 321cce998757b854cfbac19888ebb5c037fde271 e5e40e2cc42f123a4aa6e05a4ae01d51f8af4be3 1901e78e74c69bc1df4ecc39aad56b9d38df94ae d89415b5699ea8800660ca07b45124351122f988 346d19fffd7b4c92e28c31efdab4bfec36c238ef 6c4921438dc5f5661a5bfca1d8d07d6c963ebcb1 c86a46962eeec207b60299dcc1a3ca077c09757f 50142cd025e7d49ef28c60402bb66f260f8317b4 175f3678aec2892c1cfbd7e1b3893a57b6d547c9 1037504700b2c4a30f9017f5ef956c2a437729d8 6887aa486618252ebb3bf296591ecb7a190fc087 44d4547cc7db02228403810a49be5257913745b1 12055a255fcdcab4454fc9c894500f5c3a9569ff 8591b57e005ee1e56c04d7ac9d4c6feac68d182b 663c1bba Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e3:e3:6a:bc:d7:9e:df:a1:de:36:d5:4b:66:af:fd:2c:86:5b:e1:42] modulus: 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 public exponent: 10001 ]