2021-08-19 01:30:43,038 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-08-19 01:30:47,425 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-08-19 01:30:50.832  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-08-19 01:31:03.932 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-08-19 01:31:05.321  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-08-19 01:31:06.222  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-08-19 01:31:20.019  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 39.597 seconds (JVM running for 47.771) 2021-08-19 01:32:19.044  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-19 01:32:19.126 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-19 01:32:19.327 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-08-19 01:32:19.330 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-19 01:32:19.430  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-08-19 01:32:19.433  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-19 01:32:19.437  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-19 01:32:19.438  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 01:32:19.438  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-19 01:32:19.528  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-19 01:32:19.532  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-19 01:32:19.734  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-19 01:32:19.739  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 01:32:19.817  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 01:32:19.834  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-19 01:32:21.216  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-19 01:32:21.219  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-19 01:32:21.220 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-19 01:32:21.226 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-19 01:32:21.229  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1428 2021-08-19 01:32:21.229  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-19 01:32:21.232  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-19 01:32:21.234  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-19 01:32:21.320  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-19 01:32:21.321  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-19 01:32:21.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 01:32:21.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 01:32:21.324 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 01:32:21.424 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 01:32:21.425 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 01:32:21.425 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 01:32:21.432 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-19 01:32:21.618 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461139937275907120851944036442137832531050883323 IssuerDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Aug 19 01:26:09 UTC 2021 Final Date: Tue Aug 19 01:26:08 UTC 2031 SubjectDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:5e:7d:e5:1b:8c:ce:86:4c:db:e1:3f:13:ea:1a:c3:c0:0f:78:d3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7f1ee242a575668d7efd2974f06f46cf9db0ae3c c8e80363aa64e5c3c0ee6fcd5c70d71d8ded9366 4794cc16085affc7d1f5bf5d3d4cc9cb91420f92 8f5cabde7533f6e551439ff2408dd966396d7a63 fc9c6c4670e8398ac1a895fc714e9b432e3f0df5 43a5c10a35aebaeb3ff9bfb5f41b56a3483a9657 b4408bbaeba197b75f18641414b8913a8a23f42b 222a883105734885d87edab97133e664bae33bbd e2a49c03cf10c23539811bb604bb21e397b7201b cf7da8db5ced46971313e113241dcb0ab0fd7257 e6501192323b817a2d2bc7b86446b1382c654dd9 ea5f5b6b81b1420c8d77247af91c4c87ce6e2243 eacbf3b94b07ddb40593d9fbfe915bc6e8b3b9e5 e5eb5dbeaa5ea914ecbd5ae3dcdb704223ade0bf a8365adb520838dd309d299326ed7bdf2a07440e 985c303755fe403b5dcaf2f669f7db5bed50d3bb 1cf7a72ec6aa174075038d5059824d4e6a1c9391 15a9766cf148f82d49d3ffdbc4c2045d90df9f91 5b731b529b17b5dbe19668bbc936511aca2769aa de8c12bc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:54:1f:d3:0e:cb:ee:b8:24:39:8e:47:73:53:0a:36:6a:67:d1:c0] modulus: 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 public exponent: 10001 ] 2021-08-19 04:45:17.719  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-19 04:45:17.721 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-19 04:45:17.724 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-08-19 04:45:17.725 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-19 04:45:17.725  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-08-19 04:45:17.727  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-19 04:45:17.727  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-19 04:45:17.728  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-19 04:45:17.729  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-19 04:45:17.737  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-19 04:45:17.819  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:45:17.820  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:45:17.827  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-19 04:45:18.021  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-19 04:45:18.022  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-19 04:45:18.023 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-19 04:45:18.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-19 04:45:18.029  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1428 2021-08-19 04:45:18.029  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-19 04:45:18.034  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-19 04:45:18.034  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-19 04:45:18.035  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-19 04:45:18.035  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-19 04:45:18.036 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:45:18.036 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:45:18.037 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:45:18.038 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:45:18.038 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:45:18.038 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:45:18.119 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-19 04:45:18.126 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461139937275907120851944036442137832531050883323 IssuerDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Aug 19 01:26:09 UTC 2021 Final Date: Tue Aug 19 01:26:08 UTC 2031 SubjectDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:5e:7d:e5:1b:8c:ce:86:4c:db:e1:3f:13:ea:1a:c3:c0:0f:78:d3] modulus: cb294f33f3ad4016d742c0a5ec7aabfda3d18ff1fd2eef10fee274b0c5fb59530fa33045a21e864d19df018a532058ba6743b43e21409656a7e0c27ad23b20821ed18a7dc7c467e9481a2a32d303f50596e6aab1d8c66aadde64621743f8400166982399b41ca0b6d9c54e4a140e0206b339c7b58926a1c6be61a9cb6296063000996d0ae5f969431ee02bfc9d6ee30c9f6cc0b27c64dd16c54bd56228b50838001712546627c7d6bec88fde7e760a6a8e5548dbb044fc13d5547c7e7b07c385fa3bdb6b5aee43ac48828a3f51bd3e9706c207f1ca59237429429957885052adb2d58367d8fc96e61d28feed93172c070d588250fe70a73e3d8bb539f5dc773e189465cfdc0e8c2b7059d66bbdfd9d73b19f68e55fb5e7edf7198d9d7db6897a9c92bf2ff3bb19ac5374cb340d25dea5d6d3726ec0242e5b39b51db4d1c7f0014347636aa8262e6bd5e9441ae3bd7d5e6c15082cd10aeba10513acd84a918bc8a0d18e2a977fa7d13be85571cdff566d834f9a6657140f3d21b5b1efaa714b17 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7f1ee242a575668d7efd2974f06f46cf9db0ae3c c8e80363aa64e5c3c0ee6fcd5c70d71d8ded9366 4794cc16085affc7d1f5bf5d3d4cc9cb91420f92 8f5cabde7533f6e551439ff2408dd966396d7a63 fc9c6c4670e8398ac1a895fc714e9b432e3f0df5 43a5c10a35aebaeb3ff9bfb5f41b56a3483a9657 b4408bbaeba197b75f18641414b8913a8a23f42b 222a883105734885d87edab97133e664bae33bbd e2a49c03cf10c23539811bb604bb21e397b7201b cf7da8db5ced46971313e113241dcb0ab0fd7257 e6501192323b817a2d2bc7b86446b1382c654dd9 ea5f5b6b81b1420c8d77247af91c4c87ce6e2243 eacbf3b94b07ddb40593d9fbfe915bc6e8b3b9e5 e5eb5dbeaa5ea914ecbd5ae3dcdb704223ade0bf a8365adb520838dd309d299326ed7bdf2a07440e 985c303755fe403b5dcaf2f669f7db5bed50d3bb 1cf7a72ec6aa174075038d5059824d4e6a1c9391 15a9766cf148f82d49d3ffdbc4c2045d90df9f91 5b731b529b17b5dbe19668bbc936511aca2769aa de8c12bc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:1e:49:4d:83:8a:f5:68:2e:82:49:20:7f:f0:c6:4d:b2:2a:e1:2e] modulus: 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 public exponent: 10001 ] 2021-08-19 04:47:03.003  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-19 04:47:03.004 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-19 04:47:03.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-19 04:47:03.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-19 04:47:03.008  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-19 04:47:03.009  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-19 04:47:03.009  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-19 04:47:03.010  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-19 04:47:03.011  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-19 04:47:03.019  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-19 04:47:03.020  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:47:03.020  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:47:03.023  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-19 04:47:03.137  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-19 04:47:03.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-19 04:47:03.138 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-19 04:47:03.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-19 04:47:03.143  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1428 2021-08-19 04:47:03.144  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-19 04:47:03.146  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-19 04:47:03.147  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-19 04:47:03.147  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-19 04:47:03.148  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-19 04:47:03.218 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:47:03.218 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:47:03.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:47:03.220 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:47:03.221 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:47:03.221 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:47:03.223 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-19 04:47:03.229 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461139937275907120851944036442137832531050883323 IssuerDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Aug 19 01:26:09 UTC 2021 Final Date: Tue Aug 19 01:26:08 UTC 2031 SubjectDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:5e:7d:e5:1b:8c:ce:86:4c:db:e1:3f:13:ea:1a:c3:c0:0f:78:d3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7f1ee242a575668d7efd2974f06f46cf9db0ae3c c8e80363aa64e5c3c0ee6fcd5c70d71d8ded9366 4794cc16085affc7d1f5bf5d3d4cc9cb91420f92 8f5cabde7533f6e551439ff2408dd966396d7a63 fc9c6c4670e8398ac1a895fc714e9b432e3f0df5 43a5c10a35aebaeb3ff9bfb5f41b56a3483a9657 b4408bbaeba197b75f18641414b8913a8a23f42b 222a883105734885d87edab97133e664bae33bbd e2a49c03cf10c23539811bb604bb21e397b7201b cf7da8db5ced46971313e113241dcb0ab0fd7257 e6501192323b817a2d2bc7b86446b1382c654dd9 ea5f5b6b81b1420c8d77247af91c4c87ce6e2243 eacbf3b94b07ddb40593d9fbfe915bc6e8b3b9e5 e5eb5dbeaa5ea914ecbd5ae3dcdb704223ade0bf a8365adb520838dd309d299326ed7bdf2a07440e 985c303755fe403b5dcaf2f669f7db5bed50d3bb 1cf7a72ec6aa174075038d5059824d4e6a1c9391 15a9766cf148f82d49d3ffdbc4c2045d90df9f91 5b731b529b17b5dbe19668bbc936511aca2769aa de8c12bc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:b0:af:1b:10:41:8b:4c:fd:c0:63:d6:c8:63:62:a0:fb:00:dc:f8] modulus: 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 public exponent: 10001 ] 2021-08-19 04:49:35.481  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-19 04:49:35.482 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-19 04:49:35.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-19 04:49:35.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-19 04:49:35.485  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-19 04:49:35.486  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-19 04:49:35.486  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-19 04:49:35.487  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-19 04:49:35.488  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-19 04:49:35.519  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-19 04:49:35.520  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:49:35.521  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:49:35.524  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-19 04:49:35.625  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-19 04:49:35.626  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-19 04:49:35.627 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-19 04:49:35.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-19 04:49:35.630  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1428 2021-08-19 04:49:35.630  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-19 04:49:35.633  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-19 04:49:35.634  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-19 04:49:35.635  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-19 04:49:35.635  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-19 04:49:35.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:49:35.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:49:35.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:49:35.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:49:35.638 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:49:35.638 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:49:35.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-19 04:49:35.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461139937275907120851944036442137832531050883323 IssuerDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Aug 19 01:26:09 UTC 2021 Final Date: Tue Aug 19 01:26:08 UTC 2031 SubjectDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:5e:7d:e5:1b:8c:ce:86:4c:db:e1:3f:13:ea:1a:c3:c0:0f:78:d3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7f1ee242a575668d7efd2974f06f46cf9db0ae3c c8e80363aa64e5c3c0ee6fcd5c70d71d8ded9366 4794cc16085affc7d1f5bf5d3d4cc9cb91420f92 8f5cabde7533f6e551439ff2408dd966396d7a63 fc9c6c4670e8398ac1a895fc714e9b432e3f0df5 43a5c10a35aebaeb3ff9bfb5f41b56a3483a9657 b4408bbaeba197b75f18641414b8913a8a23f42b 222a883105734885d87edab97133e664bae33bbd e2a49c03cf10c23539811bb604bb21e397b7201b cf7da8db5ced46971313e113241dcb0ab0fd7257 e6501192323b817a2d2bc7b86446b1382c654dd9 ea5f5b6b81b1420c8d77247af91c4c87ce6e2243 eacbf3b94b07ddb40593d9fbfe915bc6e8b3b9e5 e5eb5dbeaa5ea914ecbd5ae3dcdb704223ade0bf a8365adb520838dd309d299326ed7bdf2a07440e 985c303755fe403b5dcaf2f669f7db5bed50d3bb 1cf7a72ec6aa174075038d5059824d4e6a1c9391 15a9766cf148f82d49d3ffdbc4c2045d90df9f91 5b731b529b17b5dbe19668bbc936511aca2769aa de8c12bc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [68:79:ee:95:2c:ed:65:e2:92:c1:b4:94:6f:13:93:54:ab:14:12:89] modulus: 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 public exponent: 10001 ] 2021-08-19 04:50:09.128  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-19 04:50:09.129 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-19 04:50:09.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-19 04:50:09.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-19 04:50:09.133  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-08-19 04:50:09.134  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-19 04:50:09.134  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-19 04:50:09.135  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-19 04:50:09.135  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-19 04:50:09.141  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-19 04:50:09.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:50:09.219  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:50:09.222  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-19 04:50:09.340  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-19 04:50:09.341  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-19 04:50:09.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-19 04:50:09.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-19 04:50:09.344  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1428 2021-08-19 04:50:09.344  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-19 04:50:09.346  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-19 04:50:09.346  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-19 04:50:09.346  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-19 04:50:09.347  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-19 04:50:09.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:50:09.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:50:09.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:50:09.348 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:50:09.348 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:50:09.348 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:50:09.349 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-19 04:50:09.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461139937275907120851944036442137832531050883323 IssuerDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Aug 19 01:26:09 UTC 2021 Final Date: Tue Aug 19 01:26:08 UTC 2031 SubjectDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:5e:7d:e5:1b:8c:ce:86:4c:db:e1:3f:13:ea:1a:c3:c0:0f:78:d3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7f1ee242a575668d7efd2974f06f46cf9db0ae3c c8e80363aa64e5c3c0ee6fcd5c70d71d8ded9366 4794cc16085affc7d1f5bf5d3d4cc9cb91420f92 8f5cabde7533f6e551439ff2408dd966396d7a63 fc9c6c4670e8398ac1a895fc714e9b432e3f0df5 43a5c10a35aebaeb3ff9bfb5f41b56a3483a9657 b4408bbaeba197b75f18641414b8913a8a23f42b 222a883105734885d87edab97133e664bae33bbd e2a49c03cf10c23539811bb604bb21e397b7201b cf7da8db5ced46971313e113241dcb0ab0fd7257 e6501192323b817a2d2bc7b86446b1382c654dd9 ea5f5b6b81b1420c8d77247af91c4c87ce6e2243 eacbf3b94b07ddb40593d9fbfe915bc6e8b3b9e5 e5eb5dbeaa5ea914ecbd5ae3dcdb704223ade0bf a8365adb520838dd309d299326ed7bdf2a07440e 985c303755fe403b5dcaf2f669f7db5bed50d3bb 1cf7a72ec6aa174075038d5059824d4e6a1c9391 15a9766cf148f82d49d3ffdbc4c2045d90df9f91 5b731b529b17b5dbe19668bbc936511aca2769aa de8c12bc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:96:17:9c:40:87:ae:30:af:8c:8d:ff:b3:61:22:ba:20:1b:b6:eb] modulus: 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 public exponent: 10001 ] 2021-08-19 04:50:42.861  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-19 04:50:42.862 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-19 04:50:42.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-08-19 04:50:42.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-19 04:50:42.865  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-08-19 04:50:42.865  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-19 04:50:42.866  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-19 04:50:42.866  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-19 04:50:42.866  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-19 04:50:42.873  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-19 04:50:42.873  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:50:42.874  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:50:42.876  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-19 04:50:43.021  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-19 04:50:43.022  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-19 04:50:43.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-19 04:50:43.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-19 04:50:43.025  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1428 2021-08-19 04:50:43.025  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-19 04:50:43.027  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-19 04:50:43.028  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-19 04:50:43.028  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-19 04:50:43.029  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-19 04:50:43.029 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:50:43.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:50:43.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:50:43.031 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:50:43.032 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:50:43.032 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:50:43.033 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-19 04:50:43.037 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461139937275907120851944036442137832531050883323 IssuerDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Aug 19 01:26:09 UTC 2021 Final Date: Tue Aug 19 01:26:08 UTC 2031 SubjectDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:5e:7d:e5:1b:8c:ce:86:4c:db:e1:3f:13:ea:1a:c3:c0:0f:78:d3] modulus: cb294f33f3ad4016d742c0a5ec7aabfda3d18ff1fd2eef10fee274b0c5fb59530fa33045a21e864d19df018a532058ba6743b43e21409656a7e0c27ad23b20821ed18a7dc7c467e9481a2a32d303f50596e6aab1d8c66aadde64621743f8400166982399b41ca0b6d9c54e4a140e0206b339c7b58926a1c6be61a9cb6296063000996d0ae5f969431ee02bfc9d6ee30c9f6cc0b27c64dd16c54bd56228b50838001712546627c7d6bec88fde7e760a6a8e5548dbb044fc13d5547c7e7b07c385fa3bdb6b5aee43ac48828a3f51bd3e9706c207f1ca59237429429957885052adb2d58367d8fc96e61d28feed93172c070d588250fe70a73e3d8bb539f5dc773e189465cfdc0e8c2b7059d66bbdfd9d73b19f68e55fb5e7edf7198d9d7db6897a9c92bf2ff3bb19ac5374cb340d25dea5d6d3726ec0242e5b39b51db4d1c7f0014347636aa8262e6bd5e9441ae3bd7d5e6c15082cd10aeba10513acd84a918bc8a0d18e2a977fa7d13be85571cdff566d834f9a6657140f3d21b5b1efaa714b17 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7f1ee242a575668d7efd2974f06f46cf9db0ae3c c8e80363aa64e5c3c0ee6fcd5c70d71d8ded9366 4794cc16085affc7d1f5bf5d3d4cc9cb91420f92 8f5cabde7533f6e551439ff2408dd966396d7a63 fc9c6c4670e8398ac1a895fc714e9b432e3f0df5 43a5c10a35aebaeb3ff9bfb5f41b56a3483a9657 b4408bbaeba197b75f18641414b8913a8a23f42b 222a883105734885d87edab97133e664bae33bbd e2a49c03cf10c23539811bb604bb21e397b7201b cf7da8db5ced46971313e113241dcb0ab0fd7257 e6501192323b817a2d2bc7b86446b1382c654dd9 ea5f5b6b81b1420c8d77247af91c4c87ce6e2243 eacbf3b94b07ddb40593d9fbfe915bc6e8b3b9e5 e5eb5dbeaa5ea914ecbd5ae3dcdb704223ade0bf a8365adb520838dd309d299326ed7bdf2a07440e 985c303755fe403b5dcaf2f669f7db5bed50d3bb 1cf7a72ec6aa174075038d5059824d4e6a1c9391 15a9766cf148f82d49d3ffdbc4c2045d90df9f91 5b731b529b17b5dbe19668bbc936511aca2769aa de8c12bc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:90:b3:ba:43:d6:9e:28:b5:98:37:aa:0b:52:03:7f:fa:52:ef:e6] modulus: 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 public exponent: 10001 ] 2021-08-19 04:51:16.409  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-19 04:51:16.410 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-19 04:51:16.411 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-08-19 04:51:16.412 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-19 04:51:16.412  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-08-19 04:51:16.413  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-19 04:51:16.413  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-19 04:51:16.414  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-19 04:51:16.414  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-19 04:51:16.419  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-19 04:51:16.420  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:51:16.420  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:51:16.422  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-19 04:51:16.524  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-19 04:51:16.525  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-19 04:51:16.525 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-19 04:51:16.527 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-19 04:51:16.528  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1428 2021-08-19 04:51:16.528  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-19 04:51:16.529  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-19 04:51:16.530  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-19 04:51:16.530  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-19 04:51:16.530  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-19 04:51:16.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:51:16.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:51:16.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:51:16.532 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:51:16.532 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:51:16.532 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:51:16.533 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-19 04:51:16.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461139937275907120851944036442137832531050883323 IssuerDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Aug 19 01:26:09 UTC 2021 Final Date: Tue Aug 19 01:26:08 UTC 2031 SubjectDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:5e:7d:e5:1b:8c:ce:86:4c:db:e1:3f:13:ea:1a:c3:c0:0f:78:d3] modulus: cb294f33f3ad4016d742c0a5ec7aabfda3d18ff1fd2eef10fee274b0c5fb59530fa33045a21e864d19df018a532058ba6743b43e21409656a7e0c27ad23b20821ed18a7dc7c467e9481a2a32d303f50596e6aab1d8c66aadde64621743f8400166982399b41ca0b6d9c54e4a140e0206b339c7b58926a1c6be61a9cb6296063000996d0ae5f969431ee02bfc9d6ee30c9f6cc0b27c64dd16c54bd56228b50838001712546627c7d6bec88fde7e760a6a8e5548dbb044fc13d5547c7e7b07c385fa3bdb6b5aee43ac48828a3f51bd3e9706c207f1ca59237429429957885052adb2d58367d8fc96e61d28feed93172c070d588250fe70a73e3d8bb539f5dc773e189465cfdc0e8c2b7059d66bbdfd9d73b19f68e55fb5e7edf7198d9d7db6897a9c92bf2ff3bb19ac5374cb340d25dea5d6d3726ec0242e5b39b51db4d1c7f0014347636aa8262e6bd5e9441ae3bd7d5e6c15082cd10aeba10513acd84a918bc8a0d18e2a977fa7d13be85571cdff566d834f9a6657140f3d21b5b1efaa714b17 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7f1ee242a575668d7efd2974f06f46cf9db0ae3c c8e80363aa64e5c3c0ee6fcd5c70d71d8ded9366 4794cc16085affc7d1f5bf5d3d4cc9cb91420f92 8f5cabde7533f6e551439ff2408dd966396d7a63 fc9c6c4670e8398ac1a895fc714e9b432e3f0df5 43a5c10a35aebaeb3ff9bfb5f41b56a3483a9657 b4408bbaeba197b75f18641414b8913a8a23f42b 222a883105734885d87edab97133e664bae33bbd e2a49c03cf10c23539811bb604bb21e397b7201b cf7da8db5ced46971313e113241dcb0ab0fd7257 e6501192323b817a2d2bc7b86446b1382c654dd9 ea5f5b6b81b1420c8d77247af91c4c87ce6e2243 eacbf3b94b07ddb40593d9fbfe915bc6e8b3b9e5 e5eb5dbeaa5ea914ecbd5ae3dcdb704223ade0bf a8365adb520838dd309d299326ed7bdf2a07440e 985c303755fe403b5dcaf2f669f7db5bed50d3bb 1cf7a72ec6aa174075038d5059824d4e6a1c9391 15a9766cf148f82d49d3ffdbc4c2045d90df9f91 5b731b529b17b5dbe19668bbc936511aca2769aa de8c12bc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:22:57:03:f6:5f:d6:7e:e1:f0:ce:b4:58:4a:8c:49:b1:88:fc:8e] modulus: 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 public exponent: 10001 ] 2021-08-19 04:51:48.644  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-19 04:51:48.645 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-19 04:51:48.646 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-08-19 04:51:48.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-19 04:51:48.647  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-08-19 04:51:48.648  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-19 04:51:48.648  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-19 04:51:48.648  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-19 04:51:48.649  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-19 04:51:48.654  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-19 04:51:48.655  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:51:48.656  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:51:48.657  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-19 04:51:48.821  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-19 04:51:48.821  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-19 04:51:48.822 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-19 04:51:48.823 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-19 04:51:48.824  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1428 2021-08-19 04:51:48.825  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-19 04:51:48.827  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-19 04:51:48.827  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-19 04:51:48.828  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-19 04:51:48.828  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-19 04:51:48.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:51:48.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:51:48.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:51:48.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:51:48.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:51:48.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:51:48.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-19 04:51:48.834 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461139937275907120851944036442137832531050883323 IssuerDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Aug 19 01:26:09 UTC 2021 Final Date: Tue Aug 19 01:26:08 UTC 2031 SubjectDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:5e:7d:e5:1b:8c:ce:86:4c:db:e1:3f:13:ea:1a:c3:c0:0f:78:d3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7f1ee242a575668d7efd2974f06f46cf9db0ae3c c8e80363aa64e5c3c0ee6fcd5c70d71d8ded9366 4794cc16085affc7d1f5bf5d3d4cc9cb91420f92 8f5cabde7533f6e551439ff2408dd966396d7a63 fc9c6c4670e8398ac1a895fc714e9b432e3f0df5 43a5c10a35aebaeb3ff9bfb5f41b56a3483a9657 b4408bbaeba197b75f18641414b8913a8a23f42b 222a883105734885d87edab97133e664bae33bbd e2a49c03cf10c23539811bb604bb21e397b7201b cf7da8db5ced46971313e113241dcb0ab0fd7257 e6501192323b817a2d2bc7b86446b1382c654dd9 ea5f5b6b81b1420c8d77247af91c4c87ce6e2243 eacbf3b94b07ddb40593d9fbfe915bc6e8b3b9e5 e5eb5dbeaa5ea914ecbd5ae3dcdb704223ade0bf a8365adb520838dd309d299326ed7bdf2a07440e 985c303755fe403b5dcaf2f669f7db5bed50d3bb 1cf7a72ec6aa174075038d5059824d4e6a1c9391 15a9766cf148f82d49d3ffdbc4c2045d90df9f91 5b731b529b17b5dbe19668bbc936511aca2769aa de8c12bc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:69:e2:88:05:67:0e:74:d2:0d:97:3a:15:3c:8f:f4:2d:3c:7b:11] modulus: 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 public exponent: 10001 ] 2021-08-19 04:53:02.339  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-08-19 04:53:02.340 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-08-19 04:53:02.341 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-19 04:53:02.342 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-08-19 04:53:02.342  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-08-19 04:53:02.343  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-08-19 04:53:02.344  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-08-19 04:53:02.344  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-08-19 04:53:02.345  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-08-19 04:53:02.418  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-08-19 04:53:02.419  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:53:02.419  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-08-19 04:53:02.421  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-08-19 04:53:02.496  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-08-19 04:53:02.497  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-08-19 04:53:02.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-08-19 04:53:02.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-08-19 04:53:02.498  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1428 2021-08-19 04:53:02.498  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-08-19 04:53:02.519  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-08-19 04:53:02.520  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-08-19 04:53:02.520  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-08-19 04:53:02.520  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-08-19 04:53:02.521 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:53:02.521 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:53:02.521 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:53:02.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-08-19 04:53:02.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-08-19 04:53:02.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-08-19 04:53:02.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart 2021-08-19 04:53:02.527 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461139937275907120851944036442137832531050883323 IssuerDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Aug 19 01:26:09 UTC 2021 Final Date: Tue Aug 19 01:26:08 UTC 2031 SubjectDN: UID=c-0987aih7zwhppgbbn,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:5e:7d:e5:1b:8c:ce:86:4c:db:e1:3f:13:ea:1a:c3:c0:0f:78:d3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 7f1ee242a575668d7efd2974f06f46cf9db0ae3c c8e80363aa64e5c3c0ee6fcd5c70d71d8ded9366 4794cc16085affc7d1f5bf5d3d4cc9cb91420f92 8f5cabde7533f6e551439ff2408dd966396d7a63 fc9c6c4670e8398ac1a895fc714e9b432e3f0df5 43a5c10a35aebaeb3ff9bfb5f41b56a3483a9657 b4408bbaeba197b75f18641414b8913a8a23f42b 222a883105734885d87edab97133e664bae33bbd e2a49c03cf10c23539811bb604bb21e397b7201b cf7da8db5ced46971313e113241dcb0ab0fd7257 e6501192323b817a2d2bc7b86446b1382c654dd9 ea5f5b6b81b1420c8d77247af91c4c87ce6e2243 eacbf3b94b07ddb40593d9fbfe915bc6e8b3b9e5 e5eb5dbeaa5ea914ecbd5ae3dcdb704223ade0bf a8365adb520838dd309d299326ed7bdf2a07440e 985c303755fe403b5dcaf2f669f7db5bed50d3bb 1cf7a72ec6aa174075038d5059824d4e6a1c9391 15a9766cf148f82d49d3ffdbc4c2045d90df9f91 5b731b529b17b5dbe19668bbc936511aca2769aa de8c12bc Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:da:0a:5a:10:79:09:1a:de:a0:24:21:d0:96:ab:05:78:88:0a:8e] modulus: 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 public exponent: 10001 ]