2021-09-08 00:38:01,491 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-08 00:38:05,787 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-08 00:38:08.905  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-09-08 00:38:21.593 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-08 00:38:22.811  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-09-08 00:38:23.699  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-08 00:38:37.606  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 38.606 seconds (JVM running for 46.407) 2021-09-08 00:39:38.802  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-08 00:39:38.889 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-08 00:39:39.004 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-08 00:39:39.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-08 00:39:39.103  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-08 00:39:39.190  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-08 00:39:39.196  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-08 00:39:39.197  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 00:39:39.197  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-08 00:39:39.204  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-08 00:39:39.207  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-08 00:39:39.403  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-08 00:39:39.485  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 00:39:39.486  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 00:39:39.503  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-08 00:39:41.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-08 00:39:41.135  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-08 00:39:41.136 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-08 00:39:41.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-08 00:39:41.142  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1495 2021-09-08 00:39:41.143  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-08 00:39:41.147  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-08 00:39:41.185  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-08 00:39:41.195  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-08 00:39:41.196  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-08 00:39:41.196 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 00:39:41.197 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 00:39:41.197 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 00:39:41.296 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 00:39:41.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 00:39:41.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 00:39:41.305 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-08 00:39:41.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 237373545883092203669536063319215096333797722430 IssuerDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 08 00:26:48 UTC 2021 Final Date: Mon Sep 08 00:26:47 UTC 2031 SubjectDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:3d:d1:a0:94:58:0b:fb:10:f4:b8:dd:ca:f8:24:18:39:da:36:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 80262edf72ad38febf4b12cc04c56ada0df56411 abee88f6bef30d22378de4c501607598dbb5f85f 623f398e877ff3f1c25a4347f0bed15d3513a6bd 3eedf66a7b9a8cbfb7cca4b2f89add6851fdc8af e25dca724f2ed69fbaa327e972a38d1c9727da93 a4afb7cef0545057cf2bf4855b5babb66a48fbf6 48df4e7a55fdbc791f80a5b229e18d9c1d53fa6f eb9500e207f42a78d92edac0c80b73585d76107c 5f4c8ebe3fd587dd57cd9d6bab6bfb79c29a7981 d2dfb6975d2e6e0f13d20efda34f91c1a75e1c8c 5759f9319387c3ca02bfcd190d5add3f5178a925 8e6de2941fad55c8879fef4de03f666b95c1a201 216161de2d9b65ad3680f523296e58bdcaee4a9b 9b0987b4f0628cc4a74bc9ba7d0515cdfd2ef673 9e48159aa63dee8dca74627e59d9a749439b4399 c18d8df601cc6ad43927490ceba2bbb6fe8eeb96 bcf5eb6a392b9b771138125dc9ac3d4950e627c5 387f4090658884c7619993c116b7945d9f271687 e691f2b2c228e037d9154e795d9118b45ca8bd44 12551465 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:a6:b3:ca:95:c3:25:d9:70:5f:ef:2e:52:c3:76:08:03:98:a9:b1] modulus: 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 public exponent: 10001 ] 2021-09-08 01:50:55.962  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-08 01:50:55.964 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-08 01:50:55.986 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-08 01:50:55.988 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-08 01:50:55.989  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-08 01:50:55.990  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-08 01:50:55.991  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-08 01:50:55.992  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-08 01:50:55.993  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-08 01:50:56.004  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-08 01:50:56.005  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:50:56.006  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:50:56.086  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-08 01:50:56.183  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-08 01:50:56.185  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-08 01:50:56.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-08 01:50:56.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-08 01:50:56.193  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1495 2021-09-08 01:50:56.194  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-08 01:50:56.197  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-08 01:50:56.198  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-08 01:50:56.198  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-08 01:50:56.199  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-08 01:50:56.199 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:50:56.199 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:50:56.200 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:50:56.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:50:56.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:50:56.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:50:56.289 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-08 01:50:56.297 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 237373545883092203669536063319215096333797722430 IssuerDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 08 00:26:48 UTC 2021 Final Date: Mon Sep 08 00:26:47 UTC 2031 SubjectDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:3d:d1:a0:94:58:0b:fb:10:f4:b8:dd:ca:f8:24:18:39:da:36:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 80262edf72ad38febf4b12cc04c56ada0df56411 abee88f6bef30d22378de4c501607598dbb5f85f 623f398e877ff3f1c25a4347f0bed15d3513a6bd 3eedf66a7b9a8cbfb7cca4b2f89add6851fdc8af e25dca724f2ed69fbaa327e972a38d1c9727da93 a4afb7cef0545057cf2bf4855b5babb66a48fbf6 48df4e7a55fdbc791f80a5b229e18d9c1d53fa6f eb9500e207f42a78d92edac0c80b73585d76107c 5f4c8ebe3fd587dd57cd9d6bab6bfb79c29a7981 d2dfb6975d2e6e0f13d20efda34f91c1a75e1c8c 5759f9319387c3ca02bfcd190d5add3f5178a925 8e6de2941fad55c8879fef4de03f666b95c1a201 216161de2d9b65ad3680f523296e58bdcaee4a9b 9b0987b4f0628cc4a74bc9ba7d0515cdfd2ef673 9e48159aa63dee8dca74627e59d9a749439b4399 c18d8df601cc6ad43927490ceba2bbb6fe8eeb96 bcf5eb6a392b9b771138125dc9ac3d4950e627c5 387f4090658884c7619993c116b7945d9f271687 e691f2b2c228e037d9154e795d9118b45ca8bd44 12551465 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [16:b3:71:ca:45:f3:41:00:14:5a:7f:22:b4:c4:6b:ac:c1:99:81:1b] modulus: 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 public exponent: 10001 ] 2021-09-08 01:54:03.860  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-08 01:54:03.861 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-08 01:54:03.863 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-08 01:54:03.864 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-08 01:54:03.865  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-09-08 01:54:03.866  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-08 01:54:03.884  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-08 01:54:03.885  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-08 01:54:03.886  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-08 01:54:03.892  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-08 01:54:03.893  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:54:03.893  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:54:03.898  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-08 01:54:04.743  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-08 01:54:04.744  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-08 01:54:04.745 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-08 01:54:04.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-08 01:54:04.749  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1495 2021-09-08 01:54:04.749  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-08 01:54:04.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-08 01:54:04.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-08 01:54:04.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-08 01:54:04.752  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-08 01:54:04.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:54:04.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:54:04.753 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:54:04.753 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:54:04.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:54:04.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:54:04.755 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-08 01:54:04.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 237373545883092203669536063319215096333797722430 IssuerDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 08 00:26:48 UTC 2021 Final Date: Mon Sep 08 00:26:47 UTC 2031 SubjectDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:3d:d1:a0:94:58:0b:fb:10:f4:b8:dd:ca:f8:24:18:39:da:36:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 80262edf72ad38febf4b12cc04c56ada0df56411 abee88f6bef30d22378de4c501607598dbb5f85f 623f398e877ff3f1c25a4347f0bed15d3513a6bd 3eedf66a7b9a8cbfb7cca4b2f89add6851fdc8af e25dca724f2ed69fbaa327e972a38d1c9727da93 a4afb7cef0545057cf2bf4855b5babb66a48fbf6 48df4e7a55fdbc791f80a5b229e18d9c1d53fa6f eb9500e207f42a78d92edac0c80b73585d76107c 5f4c8ebe3fd587dd57cd9d6bab6bfb79c29a7981 d2dfb6975d2e6e0f13d20efda34f91c1a75e1c8c 5759f9319387c3ca02bfcd190d5add3f5178a925 8e6de2941fad55c8879fef4de03f666b95c1a201 216161de2d9b65ad3680f523296e58bdcaee4a9b 9b0987b4f0628cc4a74bc9ba7d0515cdfd2ef673 9e48159aa63dee8dca74627e59d9a749439b4399 c18d8df601cc6ad43927490ceba2bbb6fe8eeb96 bcf5eb6a392b9b771138125dc9ac3d4950e627c5 387f4090658884c7619993c116b7945d9f271687 e691f2b2c228e037d9154e795d9118b45ca8bd44 12551465 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:a9:87:f4:e0:41:50:ee:e9:76:24:d4:d9:83:a6:a3:3a:38:69:1d] modulus: b68afebc0e12d40593b14da32688be4f6fc53d406d57abc436bcf58bdc2991793a610c04049b73ae6a76b7b23c546ff42dacb82065f47449b62fd482720e86ebbee4c7e44f8fe0a6e190eb011dae0e7d079ddd2d4720817bf93acfb7cbf635dcf6a6fac4cf4070d24494044a72097587a7c7bd365e0f55d6380242d2a71bc55385174e29042078bf45f2c0fcc0a040dc9617ce061071ffdda5bca21b273a334711769c22074738b32ec33188055e0e64e96ac7bf44ca39833cdf972912518168fbc085b03f0d748b0b38cb9fe8f79b0094e2234ffd216813c1271b5a433076751f8ff07dfe256c5f8632c730fd0dffca09c722c2bf82d99f7a99d1d4a118d955 public exponent: 10001 ] 2021-09-08 01:54:08.891  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-08 01:54:08.892 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-08 01:54:08.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-08 01:54:08.894 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-08 01:54:08.894  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-08 01:54:08.895  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-08 01:54:08.896  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-08 01:54:08.896  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-08 01:54:08.896  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-08 01:54:08.901  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-08 01:54:08.902  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:54:08.902  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:54:08.904  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-08 01:54:08.955  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-08 01:54:08.985  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-08 01:54:08.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-08 01:54:08.987 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-08 01:54:08.991  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1495 2021-09-08 01:54:08.992  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-08 01:54:08.994  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-08 01:54:08.995  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-08 01:54:08.995  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-08 01:54:08.995  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-08 01:54:08.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:54:08.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:54:08.996 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:54:08.997 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:54:08.997 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:54:08.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:54:08.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-08 01:54:09.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 237373545883092203669536063319215096333797722430 IssuerDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 08 00:26:48 UTC 2021 Final Date: Mon Sep 08 00:26:47 UTC 2031 SubjectDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:3d:d1:a0:94:58:0b:fb:10:f4:b8:dd:ca:f8:24:18:39:da:36:4f] modulus: b65617cc6fe5ff049483a2466f5ad2c4f11bf79d9ca2bef0ce84cc2e6ed880e72bc23b5cf83a6b89c2bfcb910a258b8491f5d57fb4f512715ea9c052e069a5193ad1daf2ff99f2c935ec30ae9ea75b1987ca36c2e856ba897e15a711dc6daf83a7ab6838c6b742d67e4ef192606f55ff3dff228020c748e2fcbb9d628f27d2c6268936b240d68af2f21d9ee3cb1ae301f217baf6235e8bae822727731cadd1616a54582563ce3374c9ee259ed26a8814a78c8e0ad947fc8a56aa7745a618e74005ca2593f75622d653392e39255330fc0f9e1c19e041d776a49a9f8aad5fcf900ffb74999268598bcc2ca669af4f632ec369a4cd8d369c55a37273c272468e6b65c9fe64cdff104551103f293cfc407d1062700f5ffda50d295aac42301427233a950c117d89e265e8b1793779775bd5034e7646215eb158775df9837c26b6261c760fbcded9f8b1935ebdefc70c2837fa482b0d099a6e46c9c86876158d6a74fcb68ec45d6c0a76bcd6a76227d84eea4217283131096dcf2fbd5247637b8d11 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 80262edf72ad38febf4b12cc04c56ada0df56411 abee88f6bef30d22378de4c501607598dbb5f85f 623f398e877ff3f1c25a4347f0bed15d3513a6bd 3eedf66a7b9a8cbfb7cca4b2f89add6851fdc8af e25dca724f2ed69fbaa327e972a38d1c9727da93 a4afb7cef0545057cf2bf4855b5babb66a48fbf6 48df4e7a55fdbc791f80a5b229e18d9c1d53fa6f eb9500e207f42a78d92edac0c80b73585d76107c 5f4c8ebe3fd587dd57cd9d6bab6bfb79c29a7981 d2dfb6975d2e6e0f13d20efda34f91c1a75e1c8c 5759f9319387c3ca02bfcd190d5add3f5178a925 8e6de2941fad55c8879fef4de03f666b95c1a201 216161de2d9b65ad3680f523296e58bdcaee4a9b 9b0987b4f0628cc4a74bc9ba7d0515cdfd2ef673 9e48159aa63dee8dca74627e59d9a749439b4399 c18d8df601cc6ad43927490ceba2bbb6fe8eeb96 bcf5eb6a392b9b771138125dc9ac3d4950e627c5 387f4090658884c7619993c116b7945d9f271687 e691f2b2c228e037d9154e795d9118b45ca8bd44 12551465 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:ce:15:87:2c:67:95:fb:c7:2c:c6:4f:14:b6:2d:41:6c:ed:31:5d] modulus: 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 public exponent: 10001 ] 2021-09-08 01:56:02.566  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-08 01:56:02.567 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-08 01:56:02.569 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-08 01:56:02.570 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-08 01:56:02.570  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-08 01:56:02.571  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-08 01:56:02.571  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-08 01:56:02.571  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-08 01:56:02.585  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-08 01:56:02.590  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-08 01:56:02.591  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:56:02.591  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:56:02.592  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-08 01:56:02.670  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-08 01:56:02.671  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-08 01:56:02.685 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-08 01:56:02.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-08 01:56:02.687  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1495 2021-09-08 01:56:02.687  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-08 01:56:02.690  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-08 01:56:02.690  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-08 01:56:02.690  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-08 01:56:02.691  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-08 01:56:02.691 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:56:02.692 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:56:02.692 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:56:02.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:56:02.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:56:02.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:56:02.695 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-08 01:56:02.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 237373545883092203669536063319215096333797722430 IssuerDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 08 00:26:48 UTC 2021 Final Date: Mon Sep 08 00:26:47 UTC 2031 SubjectDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:3d:d1:a0:94:58:0b:fb:10:f4:b8:dd:ca:f8:24:18:39:da:36:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 80262edf72ad38febf4b12cc04c56ada0df56411 abee88f6bef30d22378de4c501607598dbb5f85f 623f398e877ff3f1c25a4347f0bed15d3513a6bd 3eedf66a7b9a8cbfb7cca4b2f89add6851fdc8af e25dca724f2ed69fbaa327e972a38d1c9727da93 a4afb7cef0545057cf2bf4855b5babb66a48fbf6 48df4e7a55fdbc791f80a5b229e18d9c1d53fa6f eb9500e207f42a78d92edac0c80b73585d76107c 5f4c8ebe3fd587dd57cd9d6bab6bfb79c29a7981 d2dfb6975d2e6e0f13d20efda34f91c1a75e1c8c 5759f9319387c3ca02bfcd190d5add3f5178a925 8e6de2941fad55c8879fef4de03f666b95c1a201 216161de2d9b65ad3680f523296e58bdcaee4a9b 9b0987b4f0628cc4a74bc9ba7d0515cdfd2ef673 9e48159aa63dee8dca74627e59d9a749439b4399 c18d8df601cc6ad43927490ceba2bbb6fe8eeb96 bcf5eb6a392b9b771138125dc9ac3d4950e627c5 387f4090658884c7619993c116b7945d9f271687 e691f2b2c228e037d9154e795d9118b45ca8bd44 12551465 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fc:2a:92:52:80:bd:3d:d8:35:f7:08:97:85:d7:11:2e:09:c4:ae:3a] modulus: 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 public exponent: 10001 ] 2021-09-08 01:58:52.598  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-08 01:58:52.599 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-08 01:58:52.601 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-08 01:58:52.601 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-08 01:58:52.602  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-09-08 01:58:52.603  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-08 01:58:52.603  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-08 01:58:52.603  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-08 01:58:52.604  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-08 01:58:52.608  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-08 01:58:52.609  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:58:52.609  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:58:52.611  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-08 01:58:52.767  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-08 01:58:52.768  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-08 01:58:52.768 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-08 01:58:52.770 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-08 01:58:52.771  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1495 2021-09-08 01:58:52.771  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-08 01:58:52.773  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-08 01:58:52.773  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-08 01:58:52.773  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-08 01:58:52.774  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-08 01:58:52.774 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:58:52.774 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:58:52.774 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:58:52.775 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:58:52.775 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:58:52.775 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:58:52.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-08 01:58:52.789 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 237373545883092203669536063319215096333797722430 IssuerDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 08 00:26:48 UTC 2021 Final Date: Mon Sep 08 00:26:47 UTC 2031 SubjectDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:3d:d1:a0:94:58:0b:fb:10:f4:b8:dd:ca:f8:24:18:39:da:36:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 80262edf72ad38febf4b12cc04c56ada0df56411 abee88f6bef30d22378de4c501607598dbb5f85f 623f398e877ff3f1c25a4347f0bed15d3513a6bd 3eedf66a7b9a8cbfb7cca4b2f89add6851fdc8af e25dca724f2ed69fbaa327e972a38d1c9727da93 a4afb7cef0545057cf2bf4855b5babb66a48fbf6 48df4e7a55fdbc791f80a5b229e18d9c1d53fa6f eb9500e207f42a78d92edac0c80b73585d76107c 5f4c8ebe3fd587dd57cd9d6bab6bfb79c29a7981 d2dfb6975d2e6e0f13d20efda34f91c1a75e1c8c 5759f9319387c3ca02bfcd190d5add3f5178a925 8e6de2941fad55c8879fef4de03f666b95c1a201 216161de2d9b65ad3680f523296e58bdcaee4a9b 9b0987b4f0628cc4a74bc9ba7d0515cdfd2ef673 9e48159aa63dee8dca74627e59d9a749439b4399 c18d8df601cc6ad43927490ceba2bbb6fe8eeb96 bcf5eb6a392b9b771138125dc9ac3d4950e627c5 387f4090658884c7619993c116b7945d9f271687 e691f2b2c228e037d9154e795d9118b45ca8bd44 12551465 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:0f:8a:d5:dd:45:06:22:0b:7f:f4:6f:ad:f6:60:4e:1a:7a:93:a2] modulus: deb13fe030a6945113707630db03c8333ead201e386d79793fcbed5ea302686d71a0341a288f5d8fcfe89118595485aaa5e7f09106ba5ea15f4b8ab940f9a42ebd86a36beaa5e83ae2bebc6d00943739e625102373a0d02ff046d133061cb90cce035e31236829f9e994a12b5e5cadb1f885104159eabc71f95177deb273102c1816ecc991b5ac8e9574c6eaf579d695b501a7939798857add71ecef32154158295df088720bb639553cd4f2f8e503b71588e0afcfa19065a35a351dde400385b58bb48d169d976537b5e9c0d8cfebb77950f883d66ab9b965dcceec9c266b6f92fd06dfa6568c32ebad4a6004d6f01d71b2ce544dfa11e6c0a0fc310df007ef public exponent: 10001 ] 2021-09-08 01:59:15.636  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-08 01:59:15.637 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-08 01:59:15.638 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-08 01:59:15.639 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-08 01:59:15.639  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-08 01:59:15.639  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-08 01:59:15.640  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-08 01:59:15.640  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-08 01:59:15.640  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-08 01:59:15.644  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-08 01:59:15.644  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:59:15.644  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:59:15.645  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-08 01:59:15.755  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-08 01:59:15.785  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-08 01:59:15.785 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-08 01:59:15.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-08 01:59:15.788  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1495 2021-09-08 01:59:15.788  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-08 01:59:15.790  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-08 01:59:15.791  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-08 01:59:15.791  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-08 01:59:15.792  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-08 01:59:15.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:59:15.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:59:15.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:59:15.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:59:15.795 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:59:15.795 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:59:15.796 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-08 01:59:15.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 237373545883092203669536063319215096333797722430 IssuerDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 08 00:26:48 UTC 2021 Final Date: Mon Sep 08 00:26:47 UTC 2031 SubjectDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:3d:d1:a0:94:58:0b:fb:10:f4:b8:dd:ca:f8:24:18:39:da:36:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 80262edf72ad38febf4b12cc04c56ada0df56411 abee88f6bef30d22378de4c501607598dbb5f85f 623f398e877ff3f1c25a4347f0bed15d3513a6bd 3eedf66a7b9a8cbfb7cca4b2f89add6851fdc8af e25dca724f2ed69fbaa327e972a38d1c9727da93 a4afb7cef0545057cf2bf4855b5babb66a48fbf6 48df4e7a55fdbc791f80a5b229e18d9c1d53fa6f eb9500e207f42a78d92edac0c80b73585d76107c 5f4c8ebe3fd587dd57cd9d6bab6bfb79c29a7981 d2dfb6975d2e6e0f13d20efda34f91c1a75e1c8c 5759f9319387c3ca02bfcd190d5add3f5178a925 8e6de2941fad55c8879fef4de03f666b95c1a201 216161de2d9b65ad3680f523296e58bdcaee4a9b 9b0987b4f0628cc4a74bc9ba7d0515cdfd2ef673 9e48159aa63dee8dca74627e59d9a749439b4399 c18d8df601cc6ad43927490ceba2bbb6fe8eeb96 bcf5eb6a392b9b771138125dc9ac3d4950e627c5 387f4090658884c7619993c116b7945d9f271687 e691f2b2c228e037d9154e795d9118b45ca8bd44 12551465 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:f3:b2:2d:bb:da:17:8e:5a:d7:f1:42:9d:41:42:e9:c0:f4:21:84] modulus: 9fb72bac8a1d750953eeaff774a34002af87e0869b04d17c84574adc7991ce101fc662d46e0e7567e87f90604d3922cff67ef1b14d88d24dda2e365814d82bf7720c8c5676c91d2d96b9b0aececa930d9cf28089705a4dda5163bf0155be2975de4aa8c453bf36df85bed55c5fc8e8a7cfa22f11d6239510b4965bcaea5c1b38b8fe726b1a0c5bc52a2b13721646b8dcd840339d0e1a18fb4eaa96f392c4c1971d3c0e43a0b9cf3b5511df8255659b939aa02ef1fc82cc3ba3f4ef1404f6a9711afd8a6bbf0be04d84ff59e318fd38c860eaa5700aa346ad25c9307d238c0fa4e5ee0b2e41f9588da9d6cd7d74c927003b832e3750fde91f45817a33305a9ce5 public exponent: 10001 ] 2021-09-08 01:59:49.385  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-08 01:59:49.386 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-08 01:59:49.388 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-08 01:59:49.388 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-08 01:59:49.388  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-08 01:59:49.389  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-08 01:59:49.389  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-08 01:59:49.389  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-08 01:59:49.390  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-08 01:59:49.394  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-08 01:59:49.394  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:59:49.394  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 01:59:49.395  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-08 01:59:49.489  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-08 01:59:49.489  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-08 01:59:49.490 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-08 01:59:49.491 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-08 01:59:49.492  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1495 2021-09-08 01:59:49.492  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-08 01:59:49.494  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-08 01:59:49.495  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-08 01:59:49.495  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-08 01:59:49.495  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-08 01:59:49.495 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:59:49.496 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:59:49.496 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:59:49.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 01:59:49.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 01:59:49.497 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 01:59:49.498 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-08 01:59:49.500 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 237373545883092203669536063319215096333797722430 IssuerDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 08 00:26:48 UTC 2021 Final Date: Mon Sep 08 00:26:47 UTC 2031 SubjectDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:3d:d1:a0:94:58:0b:fb:10:f4:b8:dd:ca:f8:24:18:39:da:36:4f] modulus: b65617cc6fe5ff049483a2466f5ad2c4f11bf79d9ca2bef0ce84cc2e6ed880e72bc23b5cf83a6b89c2bfcb910a258b8491f5d57fb4f512715ea9c052e069a5193ad1daf2ff99f2c935ec30ae9ea75b1987ca36c2e856ba897e15a711dc6daf83a7ab6838c6b742d67e4ef192606f55ff3dff228020c748e2fcbb9d628f27d2c6268936b240d68af2f21d9ee3cb1ae301f217baf6235e8bae822727731cadd1616a54582563ce3374c9ee259ed26a8814a78c8e0ad947fc8a56aa7745a618e74005ca2593f75622d653392e39255330fc0f9e1c19e041d776a49a9f8aad5fcf900ffb74999268598bcc2ca669af4f632ec369a4cd8d369c55a37273c272468e6b65c9fe64cdff104551103f293cfc407d1062700f5ffda50d295aac42301427233a950c117d89e265e8b1793779775bd5034e7646215eb158775df9837c26b6261c760fbcded9f8b1935ebdefc70c2837fa482b0d099a6e46c9c86876158d6a74fcb68ec45d6c0a76bcd6a76227d84eea4217283131096dcf2fbd5247637b8d11 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 80262edf72ad38febf4b12cc04c56ada0df56411 abee88f6bef30d22378de4c501607598dbb5f85f 623f398e877ff3f1c25a4347f0bed15d3513a6bd 3eedf66a7b9a8cbfb7cca4b2f89add6851fdc8af e25dca724f2ed69fbaa327e972a38d1c9727da93 a4afb7cef0545057cf2bf4855b5babb66a48fbf6 48df4e7a55fdbc791f80a5b229e18d9c1d53fa6f eb9500e207f42a78d92edac0c80b73585d76107c 5f4c8ebe3fd587dd57cd9d6bab6bfb79c29a7981 d2dfb6975d2e6e0f13d20efda34f91c1a75e1c8c 5759f9319387c3ca02bfcd190d5add3f5178a925 8e6de2941fad55c8879fef4de03f666b95c1a201 216161de2d9b65ad3680f523296e58bdcaee4a9b 9b0987b4f0628cc4a74bc9ba7d0515cdfd2ef673 9e48159aa63dee8dca74627e59d9a749439b4399 c18d8df601cc6ad43927490ceba2bbb6fe8eeb96 bcf5eb6a392b9b771138125dc9ac3d4950e627c5 387f4090658884c7619993c116b7945d9f271687 e691f2b2c228e037d9154e795d9118b45ca8bd44 12551465 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [06:1b:90:28:bd:34:a4:c6:1f:73:70:7e:85:a9:fc:a1:27:33:8b:44] modulus: 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 public exponent: 10001 ] 2021-09-08 02:01:35.679  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-09-08 02:01:35.680 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-08 02:01:35.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-08 02:01:35.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-08 02:01:35.683  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-08 02:01:35.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-09-08 02:01:35.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-08 02:01:35.686  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-08 02:01:35.686  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-08 02:01:35.696  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-08 02:01:35.696  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 02:01:35.696  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-08 02:01:35.698  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-08 02:01:35.774  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-08 02:01:35.774  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-09-08 02:01:35.775 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-09-08 02:01:35.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-09-08 02:01:35.788  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1495 2021-09-08 02:01:35.788  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-09-08 02:01:35.792  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-09-08 02:01:35.792  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-09-08 02:01:35.793  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-09-08 02:01:35.793  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-08 02:01:35.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 02:01:35.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 02:01:35.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 02:01:35.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-08 02:01:35.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-08 02:01:35.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-08 02:01:35.797 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-08 02:01:35.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 237373545883092203669536063319215096333797722430 IssuerDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 08 00:26:48 UTC 2021 Final Date: Mon Sep 08 00:26:47 UTC 2031 SubjectDN: UID=c-05znmvatwmh880hwq,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:3d:d1:a0:94:58:0b:fb:10:f4:b8:dd:ca:f8:24:18:39:da:36:4f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 80262edf72ad38febf4b12cc04c56ada0df56411 abee88f6bef30d22378de4c501607598dbb5f85f 623f398e877ff3f1c25a4347f0bed15d3513a6bd 3eedf66a7b9a8cbfb7cca4b2f89add6851fdc8af e25dca724f2ed69fbaa327e972a38d1c9727da93 a4afb7cef0545057cf2bf4855b5babb66a48fbf6 48df4e7a55fdbc791f80a5b229e18d9c1d53fa6f eb9500e207f42a78d92edac0c80b73585d76107c 5f4c8ebe3fd587dd57cd9d6bab6bfb79c29a7981 d2dfb6975d2e6e0f13d20efda34f91c1a75e1c8c 5759f9319387c3ca02bfcd190d5add3f5178a925 8e6de2941fad55c8879fef4de03f666b95c1a201 216161de2d9b65ad3680f523296e58bdcaee4a9b 9b0987b4f0628cc4a74bc9ba7d0515cdfd2ef673 9e48159aa63dee8dca74627e59d9a749439b4399 c18d8df601cc6ad43927490ceba2bbb6fe8eeb96 bcf5eb6a392b9b771138125dc9ac3d4950e627c5 387f4090658884c7619993c116b7945d9f271687 e691f2b2c228e037d9154e795d9118b45ca8bd44 12551465 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:40:21:b0:e1:18:b7:a5:b1:ac:c0:21:83:6f:00:ab:24:f0:c8:7a] modulus: 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 public exponent: 10001 ]