2021-05-13 04:13:24,223 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-05-13 04:13:27,638 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-05-13 04:13:30.027  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-05-13 04:13:40.622 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-05-13 04:13:41.543  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-05-13 04:13:42.229  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-05-13 04:13:53.634  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 31.589 seconds (JVM running for 37.996) 2021-05-13 04:23:25.228  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 04:23:25.236 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 04:23:25.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-13 04:23:25.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 04:23:25.427  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-05-13 04:23:25.430  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 04:23:25.523  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 04:23:25.524  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 04:23:25.524  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 04:23:25.531  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 04:23:25.534  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 04:23:25.631  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 04:23:25.636  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 04:23:25.637  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 04:23:25.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 04:23:26.834  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 04:23:26.838  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 04:23:26.838 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 04:23:26.922 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 04:23:26.925  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 04:23:26.926  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 04:23:26.932  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 04:23:26.937  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 04:23:27.024  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 04:23:27.026  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 04:23:27.026 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 04:23:27.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 04:23:27.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 04:23:27.038 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 04:23:27.038 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 04:23:27.039 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 04:23:27.124 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 04:23:27.238 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:e2:03:d4:2a:3a:be:fb:63:05:3f:2a:e9:9b:ff:d4:43:0b:e7:5d] modulus: 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 public exponent: 10001 ] 2021-05-13 05:22:15.742  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:22:15.744 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:22:15.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-13 05:22:15.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:22:15.748  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-13 05:22:15.749  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:22:15.749  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:22:15.750  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:22:15.822  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:22:15.829  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:22:15.830  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:22:15.830  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:22:15.833  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:22:16.017  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:22:16.017  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:22:16.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:22:16.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:22:16.025  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:22:16.026  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:22:16.033  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:22:16.034  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:22:16.035  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:22:16.035  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:22:16.036 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:22:16.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:22:16.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:22:16.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:22:16.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:22:16.039 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:22:16.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:22:16.046 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:1b:dc:6c:3e:21:51:27:7a:06:df:15:74:c8:07:10:94:e2:34:d7] modulus: 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 public exponent: 10001 ] 2021-05-13 05:23:43.465  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:23:43.467 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:23:43.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-13 05:23:43.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:23:43.469  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-05-13 05:23:43.470  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:23:43.470  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:23:43.471  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:23:43.471  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:23:43.479  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:23:43.480  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:23:43.480  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:23:43.483  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:23:43.590  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:23:43.591  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:23:43.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:23:43.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:23:43.624  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:23:43.625  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:23:43.627  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:23:43.628  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:23:43.629  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:23:43.629  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:23:43.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:23:43.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:23:43.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:23:43.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:23:43.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:23:43.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:23:43.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:23:43.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:3f:dc:d5:b2:b8:e4:f0:21:4b:e1:3e:2f:5a:70:aa:e9:ad:95:d8] modulus: 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 public exponent: 10001 ] 2021-05-13 05:26:48.155  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:26:48.156 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:26:48.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-13 05:26:48.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:26:48.158  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-13 05:26:48.159  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:26:48.159  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:26:48.159  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:26:48.160  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:26:48.164  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:26:48.165  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:26:48.165  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:26:48.166  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:26:48.247  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:26:48.248  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:26:48.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:26:48.249 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:26:48.250  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:26:48.250  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:26:48.252  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:26:48.252  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:26:48.252  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:26:48.253  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:26:48.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:26:48.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:26:48.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:26:48.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:26:48.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:26:48.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:26:48.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:26:48.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:13:43:ab:88:97:cf:c8:1a:34:92:27:ba:d8:ea:e4:7a:cf:d3:df] modulus: 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 public exponent: 10001 ] 2021-05-13 05:27:17.462  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:27:17.463 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:27:17.464 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-13 05:27:17.465 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:27:17.465  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-05-13 05:27:17.466  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:27:17.466  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:27:17.466  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:27:17.467  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:27:17.471  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:27:17.471  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:27:17.472  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:27:17.473  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:27:17.545  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:27:17.546  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:27:17.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:27:17.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:27:17.549  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:27:17.549  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:27:17.551  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:27:17.553  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:27:17.553  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:27:17.554  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:27:17.554 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:27:17.555 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:27:17.555 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:27:17.556 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:27:17.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:27:17.557 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:27:17.559 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:27:17.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:e5:c9:2e:f9:ee:a3:c5:9a:61:03:ae:ef:e4:4c:24:f6:80:8e:b5] modulus: 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 public exponent: 10001 ] 2021-05-13 05:27:33.309  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:27:33.310 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:27:33.311 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-13 05:27:33.312 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:27:33.312  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-05-13 05:27:33.313  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:27:33.313  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:27:33.313  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:27:33.314  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:27:33.318  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:27:33.319  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:27:33.319  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:27:33.320  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:27:33.421  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:27:33.422  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:27:33.422 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:27:33.423 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:27:33.424  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:27:33.425  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:27:33.426  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:27:33.426  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:27:33.426  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:27:33.427  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:27:33.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:27:33.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:27:33.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:27:33.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:27:33.429 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:27:33.429 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:27:33.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:27:33.433 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:63:c2:66:3f:e7:25:f8:22:f6:8d:ad:f0:1e:44:00:35:2c:b7:9e] modulus: 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 public exponent: 10001 ] 2021-05-13 05:28:08.757  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:28:08.758 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:28:08.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-13 05:28:08.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:28:08.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-05-13 05:28:08.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:28:08.760  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:28:08.761  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:28:08.761  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:28:08.824  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:28:08.824  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:28:08.825  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:28:08.826  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:28:08.915  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:28:08.916  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:28:08.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:28:08.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:28:08.918  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:28:08.918  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:28:08.919  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:28:08.919  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:28:08.920  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:28:08.920  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:28:08.921 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:28:08.922 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:28:08.922 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:28:08.924 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:28:08.924 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:28:08.924 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:28:08.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:28:08.928 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 8892dfba42ca720478ca8a80969788bc2e6cc3b7e9b11ce1259faf3f2ced4b4fbf843647ba5e5612297f3b005732eb7c8cfa490986f6fb9647d4a607f2d7f4654b3e5d1b1ee975ab861c095f578df6278e41e66367591f4d98221ee8f4e9336a91985f73cfccffb166fd75642ef9ee40ff45d5a45fabfdf52534b5425c9ebbc01e179546a1ccdd0811a90a1b2fa80897168f3f24b23f870ba1845b777a09856948f679559fb0d4d20e7b819a9d500cd39a9880487cdac92fd99673753c3eb73bdd0010edb8b474e9ebc1821eafae7b2b6aea880f4319f7b0a4583e5ded4abdcd9f7ee169c378f26c74a1063413bf959a0e4a7be7cd37d667f41b8c9dae889df82f9b9f5325987548e46d379ee90b80e7d58a20c8aa05fcbdd6d12a70d24195f3e23e3d7fa32b63ac8a72a1c501013ffde9751102183d392b4fee62a1c751bfd6a8e2db367f066ca02cb40477ee7b1208cbe9785d0eb0f619f7f1ef4a913fe1fd2e14e4a2eaa69828175442d523511eb4cbe9189bd0129d820c7a5b1cb27998d3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [52:43:57:02:67:d8:94:da:f7:c5:e8:7c:6d:f7:fd:76:b7:de:b9:d1] modulus: 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 public exponent: 10001 ] 2021-05-13 05:28:36.578  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:28:36.580 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:28:36.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-13 05:28:36.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:28:36.582  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-05-13 05:28:36.582  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:28:36.583  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:28:36.583  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:28:36.584  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:28:36.588  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:28:36.588  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:28:36.588  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:28:36.590  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:28:36.653  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:28:36.654  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:28:36.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:28:36.656 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:28:36.657  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:28:36.657  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:28:36.722  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:28:36.723  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:28:36.724  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:28:36.724  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:28:36.724 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:28:36.725 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:28:36.725 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:28:36.726 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:28:36.726 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:28:36.726 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:28:36.727 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:28:36.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4c:7b:ba:aa:be:44:c9:3e:28:16:9c:bb:0e:43:83:28:1f:f9:15:99] modulus: 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 public exponent: 10001 ] 2021-05-13 05:30:10.028  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:30:10.035 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:30:10.037 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-13 05:30:10.037 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:30:10.037  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-05-13 05:30:10.041  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:30:10.041  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:30:10.041  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:30:10.042  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:30:10.046  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:30:10.046  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:30:10.047  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:30:10.048  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:30:10.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:30:10.211  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:30:10.211 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:30:10.212 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:30:10.214  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:30:10.215  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:30:10.216  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:30:10.216  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:30:10.217  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:30:10.217  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:30:10.217 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:30:10.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:30:10.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:30:10.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:30:10.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:30:10.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:30:10.223 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:30:10.229 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:f3:b4:04:d8:7a:4f:37:f5:ab:70:21:c3:44:02:cc:dd:1f:69:9c] modulus: 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 public exponent: 10001 ] 2021-05-13 05:31:43.387  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:31:43.388 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:31:43.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-13 05:31:43.390 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:31:43.390  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-13 05:31:43.391  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:31:43.391  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:31:43.391  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:31:43.391  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:31:43.395  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:31:43.396  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:31:43.396  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:31:43.397  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:31:43.465  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:31:43.466  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:31:43.467 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:31:43.468 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:31:43.468  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:31:43.468  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:31:43.469  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:31:43.470  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:31:43.470  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:31:43.470  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:31:43.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:31:43.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:31:43.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:31:43.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:31:43.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:31:43.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:31:43.473 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:31:43.522 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:c1:6e:ba:94:18:0a:2c:04:81:e9:5b:c7:93:92:cf:ce:43:53:fd] modulus: 893daafcb83641460de67afea68d6ab5ade6b5824097c2d42da768606f27a9c3039437d5240135bf89a25f830a6e1f79350dc3f80f18c72f9195255f074c8d69b5a5aedba0115d49278c77b6aae3aa3ab1ecbb23b93cd56ce395892b62517bcb3bab5121b1d8bae6cb03ed22862e1cc422b94c610415fc227a69fc50e265f386e5ad7dbf90e3552450defcf4258fce82681808551cb45619fdca6b680ed4589604c2bc693052e6070feff68ae1fdaa012af5516f79196fce7205867dd981579af0e82c3853ce010dc4bab6b37bacd44763b8d916468e2df5951b3645d95ed6e40c2e9932a332c9958063bed1222f48985a0c4f4fac965fb9a5876a87ba7f10ab public exponent: 10001 ] 2021-05-13 05:35:02.081  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:35:02.082 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:35:02.083 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-13 05:35:02.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:35:02.084  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-13 05:35:02.085  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:35:02.085  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:35:02.086  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:35:02.086  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:35:02.090  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:35:02.090  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:35:02.091  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:35:02.092  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:35:02.178  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:35:02.179  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:35:02.179 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:35:02.180 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:35:02.181  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:35:02.181  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:35:02.182  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:35:02.183  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:35:02.183  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:35:02.183  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:35:02.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:35:02.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:35:02.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:35:02.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:35:02.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:35:02.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:35:02.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:35:02.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:c4:13:d8:b5:bd:17:33:79:0d:28:1a:18:06:b2:d7:64:6b:ed:72] modulus: 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 public exponent: 10001 ] 2021-05-13 05:36:41.186  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:36:41.187 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:36:41.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-13 05:36:41.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:36:41.188  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-13 05:36:41.189  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:36:41.189  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:36:41.189  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:36:41.189  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:36:41.193  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:36:41.194  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:36:41.194  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:36:41.195  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:36:41.278  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:36:41.279  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:36:41.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:36:41.280 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:36:41.281  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:36:41.281  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:36:41.282  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:36:41.282  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:36:41.283  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:36:41.283  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:36:41.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:36:41.284 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:36:41.284 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:36:41.284 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:36:41.285 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:36:41.285 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:36:41.286 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:36:41.288 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:3d:59:e7:54:cc:e7:92:17:8d:ad:85:e7:ea:d5:32:7d:ef:d8:ff] modulus: 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 public exponent: 10001 ] 2021-05-13 05:38:06.530  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-05-13 05:38:06.531 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-05-13 05:38:06.532 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-13 05:38:06.533 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-05-13 05:38:06.533  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-05-13 05:38:06.534  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-05-13 05:38:06.534  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-05-13 05:38:06.534  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-05-13 05:38:06.535  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-05-13 05:38:06.539  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-05-13 05:38:06.540  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:38:06.540  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-05-13 05:38:06.541  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-05-13 05:38:06.619  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-05-13 05:38:06.619  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-05-13 05:38:06.619 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-05-13 05:38:06.621 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-05-13 05:38:06.621  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1468 2021-05-13 05:38:06.621  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-05-13 05:38:06.622  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-05-13 05:38:06.622  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-05-13 05:38:06.623  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-05-13 05:38:06.623  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-05-13 05:38:06.623 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:38:06.623 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:38:06.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:38:06.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-05-13 05:38:06.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-05-13 05:38:06.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-05-13 05:38:06.625 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart 2021-05-13 05:38:06.627 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 492337992868885367858239332754101617604073563091 IssuerDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu May 13 04:05:44 UTC 2021 Final Date: Tue May 13 04:05:43 UTC 2031 SubjectDN: UID=c-004hcij36i6rjt3um,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:ae:da:cf:a1:53:0c:da:2d:0e:56:7f:32:5a:91:d9:9b:87:8c:87] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 069d06504325f720f2348784a4101aa22ed67d0e 7d70fcdeba0a4c98d7fd15f5b0ec2b0223c16b7f 2061d918bdc7bf98ec9dd39582cbba7baaf067ff f40a62c765be243a7885b28d5e146fcf6b9789d4 be374abf568371e51904f5828771ae82c0b700ae 1342247e768d8604dac1e72bcf2cbf5750318c68 1840e05e552f7157341f877767e1a56afbb9458e 8d6a629f0c2fb44136a7c0a5a3479911b4ff5856 178dce00ded9e12a8c35e2243418cbb29f997885 5882dd9dcd37eaad034209234744bdd97941f39a 29239fccec210872c5407cbb16009d078b3a6fcf 75d3cdb90d21a6e3513c661517df6eb136e4f195 4f10fa4663a72f06dd4f6b822217d0cb7d00113b 42c4849e4b478fd7f543aec7b2166c668bf33965 9bd58b716c57c71a252d4d29c1c2c120e72a8030 51f731ff34439fadc91b638ead938f08f92b811d ca3d3dde65bc9e87ddacc0a22dc331b0f33c0184 96d779e14288bc084b77a7b2f8b03efb1f6ef73d 91a287b3ab1099af56707731d90ac38891e3edb9 b62e732d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:87:0f:27:69:dd:ef:c8:6d:16:0a:6b:d7:df:83:d8:a5:a5:eb:e1] modulus: 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 public exponent: 10001 ]