2021-09-04 01:49:03,589 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-04 01:49:07,292 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-04 01:49:09.984  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-09-04 01:49:20.784 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-04 01:49:21.896  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-09-04 01:49:22.782  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-04 01:49:34.386  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 32.89 seconds (JVM running for 39.406) 2021-09-04 01:50:03.680  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 01:50:03.690 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 01:50:03.789 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-04 01:50:03.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 01:50:03.877  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-04 01:50:03.880  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 01:50:03.885  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 01:50:03.886  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 01:50:03.886  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 01:50:03.892  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 01:50:03.896  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 01:50:04.176  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 01:50:04.181  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 01:50:04.182  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 01:50:04.194  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 01:50:05.690  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 01:50:05.694  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 01:50:05.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 01:50:05.702 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 01:50:05.705  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1275 2021-09-04 01:50:05.774  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 01:50:05.778  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 01:50:05.778  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 01:50:05.784  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 01:50:05.785  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 01:50:05.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 01:50:05.787 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 01:50:05.787 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 01:50:05.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 01:50:05.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 01:50:05.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 01:50:05.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 01:50:05.977 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 47745101073801081464380379219284004136824108445 IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 01:44:51 UTC 2021 Final Date: Thu Sep 04 01:44:50 UTC 2031 SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a 5c906b35ee7fef7cf05ef8ba430478c43036cd25 6395338656d4279e8ea891ab211edf3863d16aeb d7d29937baa808392e5250fb2d50969f650db912 6938d7086f4a4ac67eeed98f1bc59d0568489a20 a772963fad3be2ca12de9def5274e0cd26a09574 cbe5a1a536c28a95eeab799a877272e8654f5fa4 c0d859954afe3252062bf83dcbe0d6b50649c3c4 b6364bde1e489d6d31a84b73c606e973fd6af2e3 916e0d39edf599b9e2de3aa3a08cb0100f6bafba 74b3460bbe9e707da1d0e78b4529bc6878360fcc aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2 38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f 992a97a12659f16334fc263bacef942890eb4bf0 d247d3c86956413019ccb9998fcc60217d23d3db ff790ea3675bdb8a229edfdbbbeb64d293e50bc5 a39c04a2c833ce4ddf11226f430ee9c845274706 4204efc47e43d2782e29585c803692b65c08897b 91d11824abe64a8daa43882def1612c3ec3ac55c 2cf1700c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [41:ed:91:37:16:51:27:86:7f:c1:94:3a:2d:31:cc:ea:51:fc:64:0f] modulus: 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 public exponent: 10001 ] 2021-09-04 03:57:49.191  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 03:57:49.193 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 03:57:49.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-04 03:57:49.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 03:57:49.196  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-04 03:57:49.196  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 03:57:49.197  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 03:57:49.197  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 03:57:49.197  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 03:57:49.276  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 03:57:49.277  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 03:57:49.278  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 03:57:49.280  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 03:57:49.363  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 03:57:49.374  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 03:57:49.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 03:57:49.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 03:57:49.378  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1275 2021-09-04 03:57:49.378  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 03:57:49.381  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 03:57:49.382  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 03:57:49.382  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 03:57:49.382  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 03:57:49.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 03:57:49.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 03:57:49.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 03:57:49.385 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 03:57:49.385 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 03:57:49.385 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 03:57:49.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 03:57:49.477 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 47745101073801081464380379219284004136824108445 IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 01:44:51 UTC 2021 Final Date: Thu Sep 04 01:44:50 UTC 2031 SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a 5c906b35ee7fef7cf05ef8ba430478c43036cd25 6395338656d4279e8ea891ab211edf3863d16aeb d7d29937baa808392e5250fb2d50969f650db912 6938d7086f4a4ac67eeed98f1bc59d0568489a20 a772963fad3be2ca12de9def5274e0cd26a09574 cbe5a1a536c28a95eeab799a877272e8654f5fa4 c0d859954afe3252062bf83dcbe0d6b50649c3c4 b6364bde1e489d6d31a84b73c606e973fd6af2e3 916e0d39edf599b9e2de3aa3a08cb0100f6bafba 74b3460bbe9e707da1d0e78b4529bc6878360fcc aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2 38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f 992a97a12659f16334fc263bacef942890eb4bf0 d247d3c86956413019ccb9998fcc60217d23d3db ff790ea3675bdb8a229edfdbbbeb64d293e50bc5 a39c04a2c833ce4ddf11226f430ee9c845274706 4204efc47e43d2782e29585c803692b65c08897b 91d11824abe64a8daa43882def1612c3ec3ac55c 2cf1700c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0b:2a:2c:12:cd:0e:00:45:e9:21:59:85:37:9f:45:00:1b:6e:f0:3d] modulus: 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 public exponent: 10001 ] 2021-09-04 04:00:42.637  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 04:00:42.638 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 04:00:42.639 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-04 04:00:42.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 04:00:42.641  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-04 04:00:42.641  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 04:00:42.642  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 04:00:42.642  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 04:00:42.643  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 04:00:42.649  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 04:00:42.649  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:00:42.649  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:00:42.652  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 04:00:42.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 04:00:42.747  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 04:00:42.747 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 04:00:42.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 04:00:42.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1275 2021-09-04 04:00:42.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 04:00:42.774  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 04:00:42.775  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 04:00:42.775  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 04:00:42.776  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 04:00:42.776 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:00:42.777 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:00:42.777 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:00:42.778 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:00:42.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:00:42.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:00:42.780 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 04:00:42.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 47745101073801081464380379219284004136824108445 IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 01:44:51 UTC 2021 Final Date: Thu Sep 04 01:44:50 UTC 2031 SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a 5c906b35ee7fef7cf05ef8ba430478c43036cd25 6395338656d4279e8ea891ab211edf3863d16aeb d7d29937baa808392e5250fb2d50969f650db912 6938d7086f4a4ac67eeed98f1bc59d0568489a20 a772963fad3be2ca12de9def5274e0cd26a09574 cbe5a1a536c28a95eeab799a877272e8654f5fa4 c0d859954afe3252062bf83dcbe0d6b50649c3c4 b6364bde1e489d6d31a84b73c606e973fd6af2e3 916e0d39edf599b9e2de3aa3a08cb0100f6bafba 74b3460bbe9e707da1d0e78b4529bc6878360fcc aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2 38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f 992a97a12659f16334fc263bacef942890eb4bf0 d247d3c86956413019ccb9998fcc60217d23d3db ff790ea3675bdb8a229edfdbbbeb64d293e50bc5 a39c04a2c833ce4ddf11226f430ee9c845274706 4204efc47e43d2782e29585c803692b65c08897b 91d11824abe64a8daa43882def1612c3ec3ac55c 2cf1700c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:6e:4f:71:1e:04:11:85:26:c0:97:9d:be:31:d5:1a:a8:9a:d0:f9] modulus: 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 public exponent: 10001 ] 2021-09-04 04:00:45.401  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 04:00:45.402 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 04:00:45.403 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-04 04:00:45.403 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 04:00:45.404  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-04 04:00:45.404  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 04:00:45.405  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 04:00:45.405  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 04:00:45.405  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 04:00:45.410  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 04:00:45.410  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:00:45.411  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:00:45.412  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 04:00:45.529  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 04:00:45.529  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 04:00:45.529 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 04:00:45.531 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 04:00:45.531  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1275 2021-09-04 04:00:45.532  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 04:00:45.533  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 04:00:45.533  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 04:00:45.534  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 04:00:45.534  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 04:00:45.534 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:00:45.535 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:00:45.535 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:00:45.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:00:45.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:00:45.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:00:45.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 04:00:45.539 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 47745101073801081464380379219284004136824108445 IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 01:44:51 UTC 2021 Final Date: Thu Sep 04 01:44:50 UTC 2031 SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a 5c906b35ee7fef7cf05ef8ba430478c43036cd25 6395338656d4279e8ea891ab211edf3863d16aeb d7d29937baa808392e5250fb2d50969f650db912 6938d7086f4a4ac67eeed98f1bc59d0568489a20 a772963fad3be2ca12de9def5274e0cd26a09574 cbe5a1a536c28a95eeab799a877272e8654f5fa4 c0d859954afe3252062bf83dcbe0d6b50649c3c4 b6364bde1e489d6d31a84b73c606e973fd6af2e3 916e0d39edf599b9e2de3aa3a08cb0100f6bafba 74b3460bbe9e707da1d0e78b4529bc6878360fcc aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2 38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f 992a97a12659f16334fc263bacef942890eb4bf0 d247d3c86956413019ccb9998fcc60217d23d3db ff790ea3675bdb8a229edfdbbbeb64d293e50bc5 a39c04a2c833ce4ddf11226f430ee9c845274706 4204efc47e43d2782e29585c803692b65c08897b 91d11824abe64a8daa43882def1612c3ec3ac55c 2cf1700c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:b5:8a:b5:4c:54:10:db:69:88:c1:b3:f0:3a:4c:3b:1e:03:32:49] modulus: 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 public exponent: 10001 ] 2021-09-04 04:03:17.187  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 04:03:17.188 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 04:03:17.190 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-04 04:03:17.190 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 04:03:17.191  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-04 04:03:17.191  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 04:03:17.192  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 04:03:17.192  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 04:03:17.193  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 04:03:17.199  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 04:03:17.199  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:03:17.200  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:03:17.202  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 04:03:17.340  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 04:03:17.341  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 04:03:17.341 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 04:03:17.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 04:03:17.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1275 2021-09-04 04:03:17.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 04:03:17.378  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 04:03:17.379  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 04:03:17.379  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 04:03:17.379  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 04:03:17.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:03:17.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:03:17.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:03:17.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:03:17.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:03:17.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:03:17.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 04:03:17.385 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 47745101073801081464380379219284004136824108445 IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 01:44:51 UTC 2021 Final Date: Thu Sep 04 01:44:50 UTC 2031 SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38] modulus: b607c4639684a33dbe372d06841c86a1ba1fd6bb15518ba4efccce72fa1c396b624f75b293817f9c017cc4a632a17910dc7e3a6f9218290bd0088cdd884368e45b2a059e226c13e87d32e9bf73b27f5193ad37c65aca233304d783490912086fe6c2593add7ec7799572aedf3e456715399398152c7e40ce5643f25285bada62d961813626d4e948e3a70fc08c30a9cad833d2469b45a8000c0fa3c7a669ff385252051d811af722da5fac61244038b9d10a18a990247b4547c0cb4a1b2997803a50c7f2994f6277eecf1a2748bdca219a0bc1944f3acf351862eb6622a6bdad8b4d80527794317f19e7c11378126e575d432e2fd5f883f964bd6becb852101582ee873a9d3354f03d10ef5382d153e37e7fbcb9dc8d506726e4f06e33a48bbc18f776620b96252d211275208aa6db52ad4e994910600edc31aa3520d06bf265df20f8acda35cd31e52e902d162bc930f5ceebb8c71d24ffe752ceee6645c15dbbc157719e3f0d5538d390f88ae42f72fc26db793c3684a80b582a7c0c6bf5a1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a 5c906b35ee7fef7cf05ef8ba430478c43036cd25 6395338656d4279e8ea891ab211edf3863d16aeb d7d29937baa808392e5250fb2d50969f650db912 6938d7086f4a4ac67eeed98f1bc59d0568489a20 a772963fad3be2ca12de9def5274e0cd26a09574 cbe5a1a536c28a95eeab799a877272e8654f5fa4 c0d859954afe3252062bf83dcbe0d6b50649c3c4 b6364bde1e489d6d31a84b73c606e973fd6af2e3 916e0d39edf599b9e2de3aa3a08cb0100f6bafba 74b3460bbe9e707da1d0e78b4529bc6878360fcc aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2 38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f 992a97a12659f16334fc263bacef942890eb4bf0 d247d3c86956413019ccb9998fcc60217d23d3db ff790ea3675bdb8a229edfdbbbeb64d293e50bc5 a39c04a2c833ce4ddf11226f430ee9c845274706 4204efc47e43d2782e29585c803692b65c08897b 91d11824abe64a8daa43882def1612c3ec3ac55c 2cf1700c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:d1:e0:4b:d7:7f:77:29:23:71:0c:bc:52:8e:4e:2f:7b:1d:f8:66] modulus: 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 public exponent: 10001 ] 2021-09-04 04:05:43.202  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 04:05:43.203 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 04:05:43.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-04 04:05:43.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 04:05:43.205  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-04 04:05:43.205  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 04:05:43.206  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 04:05:43.206  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 04:05:43.206  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 04:05:43.211  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 04:05:43.211  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:05:43.211  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:05:43.213  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 04:05:43.336  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 04:05:43.336  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 04:05:43.337 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 04:05:43.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 04:05:43.338  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1275 2021-09-04 04:05:43.339  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 04:05:43.340  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 04:05:43.340  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 04:05:43.341  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 04:05:43.341  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 04:05:43.341 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:05:43.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:05:43.342 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:05:43.344 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:05:43.344 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:05:43.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:05:43.345 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 04:05:43.348 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 47745101073801081464380379219284004136824108445 IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 01:44:51 UTC 2021 Final Date: Thu Sep 04 01:44:50 UTC 2031 SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a 5c906b35ee7fef7cf05ef8ba430478c43036cd25 6395338656d4279e8ea891ab211edf3863d16aeb d7d29937baa808392e5250fb2d50969f650db912 6938d7086f4a4ac67eeed98f1bc59d0568489a20 a772963fad3be2ca12de9def5274e0cd26a09574 cbe5a1a536c28a95eeab799a877272e8654f5fa4 c0d859954afe3252062bf83dcbe0d6b50649c3c4 b6364bde1e489d6d31a84b73c606e973fd6af2e3 916e0d39edf599b9e2de3aa3a08cb0100f6bafba 74b3460bbe9e707da1d0e78b4529bc6878360fcc aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2 38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f 992a97a12659f16334fc263bacef942890eb4bf0 d247d3c86956413019ccb9998fcc60217d23d3db ff790ea3675bdb8a229edfdbbbeb64d293e50bc5 a39c04a2c833ce4ddf11226f430ee9c845274706 4204efc47e43d2782e29585c803692b65c08897b 91d11824abe64a8daa43882def1612c3ec3ac55c 2cf1700c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:71:f9:f9:d0:dd:cd:4d:05:28:e8:49:16:88:75:c6:22:96:44:67] modulus: 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 public exponent: 10001 ] 2021-09-04 04:06:12.237  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 04:06:12.238 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 04:06:12.239 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-04 04:06:12.239 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 04:06:12.240  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-04 04:06:12.240  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 04:06:12.241  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 04:06:12.241  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 04:06:12.241  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 04:06:12.245  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 04:06:12.246  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:06:12.246  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:06:12.247  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 04:06:12.338  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 04:06:12.338  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 04:06:12.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 04:06:12.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 04:06:12.340  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1275 2021-09-04 04:06:12.340  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 04:06:12.341  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 04:06:12.342  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 04:06:12.342  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 04:06:12.342  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 04:06:12.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:06:12.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:06:12.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:06:12.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:06:12.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:06:12.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:06:12.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 04:06:12.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 47745101073801081464380379219284004136824108445 IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 01:44:51 UTC 2021 Final Date: Thu Sep 04 01:44:50 UTC 2031 SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a 5c906b35ee7fef7cf05ef8ba430478c43036cd25 6395338656d4279e8ea891ab211edf3863d16aeb d7d29937baa808392e5250fb2d50969f650db912 6938d7086f4a4ac67eeed98f1bc59d0568489a20 a772963fad3be2ca12de9def5274e0cd26a09574 cbe5a1a536c28a95eeab799a877272e8654f5fa4 c0d859954afe3252062bf83dcbe0d6b50649c3c4 b6364bde1e489d6d31a84b73c606e973fd6af2e3 916e0d39edf599b9e2de3aa3a08cb0100f6bafba 74b3460bbe9e707da1d0e78b4529bc6878360fcc aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2 38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f 992a97a12659f16334fc263bacef942890eb4bf0 d247d3c86956413019ccb9998fcc60217d23d3db ff790ea3675bdb8a229edfdbbbeb64d293e50bc5 a39c04a2c833ce4ddf11226f430ee9c845274706 4204efc47e43d2782e29585c803692b65c08897b 91d11824abe64a8daa43882def1612c3ec3ac55c 2cf1700c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:61:52:6d:64:8f:6e:ee:f1:dc:bf:f3:bd:85:82:15:46:d8:05:ab] modulus: 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 public exponent: 10001 ] 2021-09-04 04:06:45.282  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 04:06:45.284 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 04:06:45.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-04 04:06:45.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 04:06:45.286  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-04 04:06:45.287  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 04:06:45.287  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 04:06:45.288  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 04:06:45.288  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 04:06:45.293  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 04:06:45.294  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:06:45.294  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:06:45.296  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 04:06:45.355  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 04:06:45.374  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 04:06:45.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 04:06:45.376 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 04:06:45.376  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1275 2021-09-04 04:06:45.376  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 04:06:45.378  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 04:06:45.378  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 04:06:45.379  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 04:06:45.379  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 04:06:45.379 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:06:45.379 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:06:45.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:06:45.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:06:45.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:06:45.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:06:45.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 04:06:45.384 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 47745101073801081464380379219284004136824108445 IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 01:44:51 UTC 2021 Final Date: Thu Sep 04 01:44:50 UTC 2031 SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a 5c906b35ee7fef7cf05ef8ba430478c43036cd25 6395338656d4279e8ea891ab211edf3863d16aeb d7d29937baa808392e5250fb2d50969f650db912 6938d7086f4a4ac67eeed98f1bc59d0568489a20 a772963fad3be2ca12de9def5274e0cd26a09574 cbe5a1a536c28a95eeab799a877272e8654f5fa4 c0d859954afe3252062bf83dcbe0d6b50649c3c4 b6364bde1e489d6d31a84b73c606e973fd6af2e3 916e0d39edf599b9e2de3aa3a08cb0100f6bafba 74b3460bbe9e707da1d0e78b4529bc6878360fcc aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2 38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f 992a97a12659f16334fc263bacef942890eb4bf0 d247d3c86956413019ccb9998fcc60217d23d3db ff790ea3675bdb8a229edfdbbbeb64d293e50bc5 a39c04a2c833ce4ddf11226f430ee9c845274706 4204efc47e43d2782e29585c803692b65c08897b 91d11824abe64a8daa43882def1612c3ec3ac55c 2cf1700c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:fd:ab:54:9a:fe:da:60:13:b6:33:eb:2a:c6:f5:ba:43:4a:70:c3] modulus: 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 public exponent: 10001 ] 2021-09-04 04:08:31.303  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-04 04:08:31.304 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-04 04:08:31.304 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-04 04:08:31.305 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-04 04:08:31.305  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-04 04:08:31.306  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-04 04:08:31.306  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-04 04:08:31.306  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-04 04:08:31.306  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-04 04:08:31.310  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-04 04:08:31.311  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:08:31.311  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-04 04:08:31.312  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-04 04:08:31.388  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-04 04:08:31.389  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-04 04:08:31.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-04 04:08:31.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-04 04:08:31.392  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1275 2021-09-04 04:08:31.392  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-04 04:08:31.393  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-04 04:08:31.393  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-04 04:08:31.394  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-04 04:08:31.394  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-04 04:08:31.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:08:31.394 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:08:31.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:08:31.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-04 04:08:31.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-04 04:08:31.396 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-04 04:08:31.397 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-04 04:08:31.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 47745101073801081464380379219284004136824108445 IssuerDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Sep 04 01:44:51 UTC 2021 Final Date: Thu Sep 04 01:44:50 UTC 2031 SubjectDN: UID=c-0far30yecge0f7c0t,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:f8:dd:2d:35:de:41:62:4a:f5:08:ec:a0:98:96:28:39:d3:b7:38] modulus: b607c4639684a33dbe372d06841c86a1ba1fd6bb15518ba4efccce72fa1c396b624f75b293817f9c017cc4a632a17910dc7e3a6f9218290bd0088cdd884368e45b2a059e226c13e87d32e9bf73b27f5193ad37c65aca233304d783490912086fe6c2593add7ec7799572aedf3e456715399398152c7e40ce5643f25285bada62d961813626d4e948e3a70fc08c30a9cad833d2469b45a8000c0fa3c7a669ff385252051d811af722da5fac61244038b9d10a18a990247b4547c0cb4a1b2997803a50c7f2994f6277eecf1a2748bdca219a0bc1944f3acf351862eb6622a6bdad8b4d80527794317f19e7c11378126e575d432e2fd5f883f964bd6becb852101582ee873a9d3354f03d10ef5382d153e37e7fbcb9dc8d506726e4f06e33a48bbc18f776620b96252d211275208aa6db52ad4e994910600edc31aa3520d06bf265df20f8acda35cd31e52e902d162bc930f5ceebb8c71d24ffe752ceee6645c15dbbc157719e3f0d5538d390f88ae42f72fc26db793c3684a80b582a7c0c6bf5a1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 20e6906327fd46c8455657b34f08b4fd1a8e569a 5c906b35ee7fef7cf05ef8ba430478c43036cd25 6395338656d4279e8ea891ab211edf3863d16aeb d7d29937baa808392e5250fb2d50969f650db912 6938d7086f4a4ac67eeed98f1bc59d0568489a20 a772963fad3be2ca12de9def5274e0cd26a09574 cbe5a1a536c28a95eeab799a877272e8654f5fa4 c0d859954afe3252062bf83dcbe0d6b50649c3c4 b6364bde1e489d6d31a84b73c606e973fd6af2e3 916e0d39edf599b9e2de3aa3a08cb0100f6bafba 74b3460bbe9e707da1d0e78b4529bc6878360fcc aeebb50a2b9f3d3b14071fdf652bc1ccda4003a2 38e3bfa7abf73ab5b08376c47aaaa28d1481ab2f 992a97a12659f16334fc263bacef942890eb4bf0 d247d3c86956413019ccb9998fcc60217d23d3db ff790ea3675bdb8a229edfdbbbeb64d293e50bc5 a39c04a2c833ce4ddf11226f430ee9c845274706 4204efc47e43d2782e29585c803692b65c08897b 91d11824abe64a8daa43882def1612c3ec3ac55c 2cf1700c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [94:74:a8:51:6c:98:8e:17:27:ed:a5:1e:51:20:35:e8:95:32:f8:5f] modulus: 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 public exponent: 10001 ]