2021-08-13 01:16:41,638 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-08-13 01:16:45,641 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-08-13 01:16:48.648  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-08-13 01:17:01.142 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-08-13 01:17:02.248  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-08-13 01:17:03.134  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-08-13 01:17:17.048  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 38.0 seconds (JVM running for 45.857) 2021-08-13 01:19:48.442  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 01:19:48.449 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 01:19:48.634 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-08-13 01:19:48.639 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 01:19:48.653  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-08-13 01:19:48.732  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 01:19:48.739  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 01:19:48.740  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 01:19:48.740  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 01:19:48.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 01:19:48.834  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 01:19:49.136  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 01:19:49.141  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 01:19:49.141  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 01:19:49.245  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 01:19:50.739  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 01:19:50.742  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 01:19:50.742 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 01:19:50.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 01:19:50.749  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 01:19:50.749  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 01:19:50.833  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 01:19:50.835  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 01:19:50.843  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 01:19:50.844  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 01:19:50.845 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 01:19:50.845 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 01:19:50.846 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 01:19:50.941 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 01:19:50.942 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 01:19:50.942 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 01:19:50.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 01:19:51.241 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:39:87:8f:9c:76:63:d5:c5:24:b4:10:1a:d9:47:32:5e:9d:89:02] modulus: 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 public exponent: 10001 ] 2021-08-13 04:26:59.230  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:26:59.238 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:26:59.239 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-08-13 04:26:59.240 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:26:59.241  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-08-13 04:26:59.242  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:26:59.242  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:26:59.242  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:26:59.243  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:26:59.251  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:26:59.252  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:26:59.252  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:26:59.257  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:26:59.456  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:26:59.457  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:26:59.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:26:59.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:26:59.464  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:26:59.464  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:26:59.531  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:26:59.532  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:26:59.533  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:26:59.533  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:26:59.534 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:26:59.534 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:26:59.534 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:26:59.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:26:59.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:26:59.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:26:59.539 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:26:59.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: b5753ab2428197b1241e067946e510c2d7ef861571ef835d13ed5445ffbbf61aa5c3f4d462efa72d4217fc083eacffd35689ea97fac30f5a0d6c2cb8aca4e4837b6dba37894a1f706ee7e917820d90d7ca4cab5fb23454b87b5847487c9632c64e979dbb57bcffbca58aaa1be2f8c5afc50d280d537c790fbe817ca5e499cb37138e820ec223a68e624917e7fab055046bf2b011721b129d3796ad82b0767d0ba8889d85273739dd8e06349fa62ae95d6f2fc57314ac0eb038d22e71f66fc5a985fdda25cb2e180d1d4634f7d37e34169258928fe733ea978e7cd81358710b5427023d44991461a8f1d02613f8e5e9ac5b3d79d588257346ba9631bddafa0458a6d27ece61272fdd391ab929115e0e69ba9f4165e101eee0843fbd577f70346cde3ef9dd3a6354df3cfec4fec1aaf6ee5a53e125e4c84b4b4730680e657552d03dbd3d1689afa563a20d582e4d3e8b65a6d5d07cb4e9f3512e345ca38678889ee085c1707009fad99a3ca0721fd7b7ed17364e82bff40344e4371a54c18bf75d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:e8:a9:20:38:77:43:0b:c6:ac:01:5c:c6:11:05:db:23:bd:0d:4e] modulus: acfa0e5e7ddd5596d19f11cc4d1cbdb1f25f86b16f89d8a3cfe4373c1359b46414458284ec7b7f0a90e57e47c49ad045bcdccf76fd05a746281196c401695658f6b53c8d99c95de0345685106021c47f1ab85b10bdacfb904e820ed62c029ed9047e104d00539b2a6dcd569e25d6eaa9858f46b21bf8b45635ff3dbd9dfb8749bd9e5d3f17d30c9a0c9508b67672b0450d7c34f2ccb308a33903f602437778dbb93c6dc94163e77ea808c7c3fd4055e5d9493bca9ec0ebfab1cc54ae53fa3ff59324c4d5be91cdd1bd9e105fa7a5de90328339c4ff9e3274bc47738695c0a8563af8120f9cfff3d99cdaaa5e5d18f92e783641dfcd3dcdb07ef972ed6b93fa39 public exponent: 10001 ] 2021-08-13 04:28:45.149  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:28:45.150 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:28:45.151 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-13 04:28:45.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:28:45.152  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-13 04:28:45.153  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:28:45.153  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:28:45.154  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:28:45.154  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:28:45.159  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:28:45.232  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:28:45.232  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:28:45.236  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:28:45.319  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:28:45.329  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:28:45.330 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:28:45.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:28:45.333  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:28:45.333  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:28:45.338  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:28:45.339  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:28:45.339  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:28:45.340  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:28:45.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:28:45.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:28:45.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:28:45.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:28:45.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:28:45.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:28:45.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:28:45.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:2a:d0:ca:ee:8a:8c:3e:56:d3:a4:78:82:fc:0b:e3:8b:e0:83:86] modulus: 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 public exponent: 10001 ] 2021-08-13 04:31:30.157  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:31:30.158 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:31:30.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-13 04:31:30.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:31:30.160  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-13 04:31:30.161  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:31:30.161  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:31:30.162  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:31:30.162  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:31:30.170  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:31:30.170  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:31:30.171  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:31:30.231  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:31:30.360  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:31:30.360  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:31:30.360 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:31:30.362 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:31:30.364  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:31:30.364  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:31:30.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:31:30.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:31:30.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:31:30.367  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:31:30.367 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:31:30.367 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:31:30.367 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:31:30.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:31:30.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:31:30.429 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:31:30.430 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:31:30.435 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:72:f7:17:ae:39:f8:ae:cc:a4:e9:97:0b:a4:f5:35:24:22:b1:39] modulus: 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 public exponent: 10001 ] 2021-08-13 04:32:02.742  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:32:02.743 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:32:02.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-08-13 04:32:02.745 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:32:02.745  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-08-13 04:32:02.745  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:32:02.746  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:32:02.746  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:32:02.746  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:32:02.755  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:32:02.756  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:32:02.756  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:32:02.758  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:32:02.912  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:32:02.912  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:32:02.912 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:32:02.929 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:32:02.933  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:32:02.934  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:32:02.936  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:32:02.937  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:32:02.937  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:32:02.938  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:32:02.938 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:32:02.938 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:32:02.939 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:32:02.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:32:02.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:32:02.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:32:02.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:32:02.943 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:d1:81:50:bd:b5:06:fd:0a:6a:14:63:74:27:72:70:ff:f9:ff:fb] modulus: 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 public exponent: 10001 ] 2021-08-13 04:32:38.081  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:32:38.082 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:32:38.084 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-08-13 04:32:38.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:32:38.098  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-08-13 04:32:38.099  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:32:38.099  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:32:38.100  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:32:38.100  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:32:38.134  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:32:38.135  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:32:38.135  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:32:38.137  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:32:38.225  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:32:38.225  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:32:38.226 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:32:38.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:32:38.230  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:32:38.230  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:32:38.231  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:32:38.232  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:32:38.232  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:32:38.233  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:32:38.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:32:38.233 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:32:38.234 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:32:38.234 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:32:38.234 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:32:38.235 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:32:38.235 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:32:38.242 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:bb:25:1f:37:b4:78:40:af:29:4c:0e:de:f0:8d:82:93:65:f9:d6] modulus: c4f97dd377efd79be45535070f842a4c7c3a20450fdc4a95c542b6e914cab0a813dda8357e298a3f31cee8448bb15579713c1bcc8ae619dda43fc1ec6c987a55588b60a169a6d78bf2e38188ae58c7f01441ccaf26461f5807c3d09feec33b4192b36237da44f559fbc3e213cda2a22c836aac5e8920fed3ee6abc8bafa5379b610efaeb02e138dfd8c36950f55372b23d50aeab7b179abe4a6d1da32e5d4de450f10a3906d5a76c02e17065be6dbf104efbd0589df9351c4ae0c7113ae697daaed40f94d687366ec7679827ce6e3c03c703273117d6361694803e196d92eff8a7d640ee3dc4ca7522ac6e91920c373a14bf7712bf7bb30756b2fd5100dda403 public exponent: 10001 ] 2021-08-13 04:33:20.137  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:33:20.139 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:33:20.141 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-13 04:33:20.141 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:33:20.141  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-13 04:33:20.142  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:33:20.143  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:33:20.143  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:33:20.143  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:33:20.150  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:33:20.151  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:33:20.151  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:33:20.153  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:33:20.308  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:33:20.309  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:33:20.310 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:33:20.311 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:33:20.330  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:33:20.330  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:33:20.331  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:33:20.332  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:33:20.332  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:33:20.333  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:33:20.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:33:20.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:33:20.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:33:20.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:33:20.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:33:20.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:33:20.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:33:20.340 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6d:be:ee:ff:41:84:da:4c:d3:58:1a:79:ba:e9:31:7e:71:93:fd:a1] modulus: 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 public exponent: 10001 ] 2021-08-13 04:34:22.382  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:34:22.384 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:34:22.385 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-13 04:34:22.385 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:34:22.386  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-13 04:34:22.386  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:34:22.386  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:34:22.387  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:34:22.387  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:34:22.393  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:34:22.393  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:34:22.393  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:34:22.395  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:34:22.510  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:34:22.511  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:34:22.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:34:22.532 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:34:22.533  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:34:22.533  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:34:22.537  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:34:22.538  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:34:22.539  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:34:22.544  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:34:22.544 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:34:22.544 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:34:22.545 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:34:22.545 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:34:22.546 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:34:22.546 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:34:22.547 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:34:22.550 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b7:08:d0:a5:2c:57:17:0f:e6:cf:40:84:09:d1:ba:df:bc:81:b9:dc] modulus: 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 public exponent: 10001 ] 2021-08-13 04:34:49.564  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:34:49.566 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:34:49.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-08-13 04:34:49.568 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:34:49.568  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-08-13 04:34:49.569  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:34:49.569  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:34:49.569  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:34:49.570  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:34:49.576  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:34:49.576  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:34:49.577  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:34:49.578  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:34:49.636  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:34:49.636  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:34:49.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:34:49.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:34:49.638  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:34:49.639  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:34:49.640  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:34:49.640  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:34:49.640  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:34:49.641  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:34:49.641 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:34:49.641 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:34:49.641 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:34:49.642 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:34:49.642 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:34:49.642 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:34:49.642 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:34:49.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:e0:9b:ec:a3:77:45:f8:c3:73:e1:bb:36:65:f0:8e:50:0c:46:c0] modulus: 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 public exponent: 10001 ] 2021-08-13 04:40:17.966  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:40:17.968 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:40:17.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-13 04:40:17.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:40:17.970  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-13 04:40:17.970  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:40:17.970  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:40:17.970  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:40:17.971  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:40:17.975  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:40:17.975  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:40:17.976  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:40:17.977  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:40:18.060  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:40:18.060  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:40:18.061 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:40:18.062 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:40:18.063  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:40:18.063  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:40:18.065  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:40:18.066  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:40:18.066  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:40:18.066  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:40:18.067 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:40:18.067 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:40:18.067 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:40:18.068 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:40:18.069 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:40:18.069 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:40:18.070 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:40:18.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:03:02:c5:11:fc:01:c0:7e:ba:23:32:28:f7:f7:8f:25:e8:ca:93] modulus: b6f201d712c909e26da9b7f41a43dd8d642bf4637a2a1e00a79701844e513af6afd99eca47cf392674183d898d8aec4164f617496bb360724a4de4bc28ba853f39d4ab38f20dc329ffe676834d2a0c9df2aa81c3bb98e181fc75093f65adf2e7a7500d8001290a9fbb2da28fac7a9dbb4addd83a276ae2508c7bdcefaf5665a01229b9316e06a0dd5205cf05884f3448ea4340e59b8fcb23f3a03d75e7686464bba4163b28dfebfe94b950f6875334f07fedde0a9a6f17ba8459127fb716fdacceaebc97d8984034f226e6b08510d459be62d5799916865151b3dd466bec33c033c59941729ace3acf5e6b60e820d9f06c0b7664374e7618fc2331b3eaabc97b public exponent: 10001 ] 2021-08-13 04:41:29.494  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:41:29.495 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:41:29.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-13 04:41:29.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:41:29.497  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-13 04:41:29.497  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:41:29.498  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:41:29.498  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:41:29.498  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:41:29.503  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:41:29.504  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:41:29.504  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:41:29.506  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:41:29.625  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:41:29.625  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:41:29.625 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:41:29.626 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:41:29.627  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:41:29.627  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:41:29.629  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:41:29.629  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:41:29.629  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:41:29.630  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:41:29.630 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:41:29.630 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:41:29.630 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:41:29.631 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:41:29.631 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:41:29.631 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:41:29.632 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:41:29.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:e9:9d:d2:7b:37:96:2d:e9:bd:89:c7:79:39:a3:54:fe:a1:39:91] modulus: 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 public exponent: 10001 ] 2021-08-13 04:42:16.718  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:42:16.720 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:42:16.721 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-13 04:42:16.721 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:42:16.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-13 04:42:16.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:42:16.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:42:16.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:42:16.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:42:16.727  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:42:16.727  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:42:16.727  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:42:16.729  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:42:16.812  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:42:16.813  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:42:16.814 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:42:16.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:42:16.818  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:42:16.818  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:42:16.821  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:42:16.821  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:42:16.822  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:42:16.822  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:42:16.823 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:42:16.823 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:42:16.823 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:42:16.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:42:16.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:42:16.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:42:16.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:42:16.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [84:fb:b1:70:9b:29:a0:8c:f3:12:8b:20:13:f3:39:6c:1e:d1:0d:0c] modulus: e834e65f3ec3dfe5715fdcaf32af9dc041a4ac5533aa4d1276a7fd32b19422ddcca05ad2c592adf4b4ac9b72a2af050ab4aef4ad5a9764d01ba520f5857ada4035e97cae43e510e90b21a1670a567b86d542c1937c48159d53623b3671de7f4492795c91f93694585c485aa46e6abf4f476c6952542de16df097e208adc460e99bd29bed88afdb8798866c9cfa81c86be1dc4913724050d5f99244947c56a0ff7454421fd8e94700db84f463603459aff4867b5f3a6fb493f64c5de0429cf2abff344c9b6101e507b3197c62300ab699bcfb55d383413ada9b452f12fbc537654e248899f73d397160c94fecb19f5c512f2fe3e1ed1bc5fd31e1af0c949ade13 public exponent: 10001 ] 2021-08-13 04:43:01.474  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:43:01.475 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:43:01.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-08-13 04:43:01.477 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:43:01.478  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-08-13 04:43:01.479  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:43:01.479  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:43:01.480  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:43:01.481  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:43:01.486  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:43:01.487  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:43:01.487  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:43:01.488  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:43:01.578  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:43:01.579  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:43:01.580 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:43:01.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:43:01.582  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:43:01.582  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:43:01.585  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:43:01.586  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:43:01.586  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:43:01.587  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:43:01.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:43:01.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:43:01.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:43:01.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:43:01.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:43:01.589 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:43:01.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:43:01.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:64:bf:0a:77:8f:a3:2c:02:4d:03:8f:fe:00:02:b2:8a:d2:bb:02] modulus: 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 public exponent: 10001 ] 2021-08-13 04:45:17.780  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:45:17.781 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:45:17.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-13 04:45:17.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:45:17.783  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-13 04:45:17.783  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:45:17.784  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:45:17.784  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:45:17.784  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:45:17.790  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:45:17.791  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:45:17.791  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:45:17.793  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:45:17.868  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:45:17.869  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:45:17.869 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:45:17.871 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:45:17.871  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:45:17.872  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:45:17.874  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:45:17.874  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:45:17.875  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:45:17.875  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:45:17.875 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:45:17.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:45:17.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:45:17.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:45:17.878 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:45:17.878 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:45:17.879 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:45:17.881 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:d8:66:90:da:f1:a0:8e:d8:ff:d5:8b:ad:7b:1e:ba:17:fa:bd:72] modulus: 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 public exponent: 10001 ] 2021-08-13 04:46:40.218  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:46:40.219 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:46:40.220 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-13 04:46:40.220 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:46:40.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-13 04:46:40.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:46:40.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:46:40.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:46:40.222  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:46:40.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:46:40.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:46:40.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:46:40.228  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:46:40.305  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:46:40.306  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:46:40.306 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:46:40.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:46:40.308  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:46:40.308  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:46:40.310  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:46:40.310  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:46:40.310  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:46:40.311  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:46:40.311 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:46:40.311 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:46:40.311 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:46:40.312 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:46:40.312 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:46:40.313 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:46:40.314 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:46:40.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: b5753ab2428197b1241e067946e510c2d7ef861571ef835d13ed5445ffbbf61aa5c3f4d462efa72d4217fc083eacffd35689ea97fac30f5a0d6c2cb8aca4e4837b6dba37894a1f706ee7e917820d90d7ca4cab5fb23454b87b5847487c9632c64e979dbb57bcffbca58aaa1be2f8c5afc50d280d537c790fbe817ca5e499cb37138e820ec223a68e624917e7fab055046bf2b011721b129d3796ad82b0767d0ba8889d85273739dd8e06349fa62ae95d6f2fc57314ac0eb038d22e71f66fc5a985fdda25cb2e180d1d4634f7d37e34169258928fe733ea978e7cd81358710b5427023d44991461a8f1d02613f8e5e9ac5b3d79d588257346ba9631bddafa0458a6d27ece61272fdd391ab929115e0e69ba9f4165e101eee0843fbd577f70346cde3ef9dd3a6354df3cfec4fec1aaf6ee5a53e125e4c84b4b4730680e657552d03dbd3d1689afa563a20d582e4d3e8b65a6d5d07cb4e9f3512e345ca38678889ee085c1707009fad99a3ca0721fd7b7ed17364e82bff40344e4371a54c18bf75d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:ad:4a:4e:54:d0:7f:0e:07:88:f4:76:16:a4:8d:0b:18:bb:18:42] modulus: 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 public exponent: 10001 ] 2021-08-13 04:48:29.001  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-13 04:48:29.002 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-13 04:48:29.002 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-08-13 04:48:29.003 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-13 04:48:29.003  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-08-13 04:48:29.003  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-13 04:48:29.004  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-13 04:48:29.004  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-13 04:48:29.004  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-13 04:48:29.011  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-13 04:48:29.011  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:48:29.012  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-13 04:48:29.014  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-13 04:48:29.113  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-13 04:48:29.113  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-13 04:48:29.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-13 04:48:29.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-13 04:48:29.115  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1824 2021-08-13 04:48:29.115  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-13 04:48:29.117  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-13 04:48:29.118  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-13 04:48:29.118  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-13 04:48:29.118  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-13 04:48:29.118 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:48:29.119 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:48:29.119 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:48:29.119 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-13 04:48:29.120 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-13 04:48:29.120 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-13 04:48:29.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-13 04:48:29.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 135066986771467427137573040515667791753587868510 IssuerDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Aug 13 01:12:03 UTC 2021 Final Date: Wed Aug 13 01:12:02 UTC 2031 SubjectDN: UID=c-0cm6ikid6dpkspybj,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1d:9a:99:65:a4:93:ae:90:96:b5:47:cb:00:b3:78:a8:91:16:b9:31] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 36d6200c06e97ad7b7cea2a202ccd693a7a6c382 f2e5b06ee09342ca4982ba8b5a65ed254ed81248 4904344a13bf249b129cb51008051eff1bc43df7 865ee7db5f13b732fabc61c28a19142ba56e2be2 cf7747679e4cdc18608f79595a6eb0880b916ff1 1bffb6cdad7ddd4d0cb236902bf18a63dd471f0b 10cc9707e5de7e6c6b1d9191603fd826cbec081c d26a1c47b8f8c62ab9d428794020ba0d772c0cc4 abe7fed9e088a8fd8de91b86f2d9554b54284adf 514fe5c20738cbcb058ddbd7951e989b6aba5762 0fbd5f452f5600a021a238811904bc83e7b73c6c d91d3040507bd5e7660a7131498ec9516c99a82e 046f80f8cde5c329fdda23f489ed526a06b1abe0 21059afd59fc04451a29fb16fd5710333d854914 ef821c07c2dfa8f44ec3c335dc99c804c8958dab 65e135ebbd0a090f76ab3195a33f6cb16584e1a2 d9d48abf1fb5c8ae7afc71c469e0c40ceeb42fd6 16305379e6d9b2e4f62e47dcd4ee813b67433a24 fde1d4129b381b3acf087aac9e2d81c261e69aba 53f179c9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:8e:29:0e:8a:95:d9:89:5e:a2:23:ef:cb:1b:44:85:94:c8:25:58] modulus: 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 public exponent: 10001 ]