2021-04-29 20:12:20,741 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-04-29 20:12:24,929 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-04-29 20:12:27.636  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-04-29 20:12:39.431 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-04-29 20:12:40.435  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-04-29 20:12:41.124  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-04-29 20:12:54.639  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 36.215 seconds (JVM running for 43.152) 2021-04-29 20:38:00.822  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 20:38:00.831 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 20:38:00.925 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-29 20:38:00.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 20:38:01.021  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-29 20:38:01.024  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 20:38:01.027  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 20:38:01.028  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 20:38:01.028  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 20:38:01.034  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 20:38:01.037  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 20:38:01.224  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 20:38:01.230  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 20:38:01.231  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 20:38:01.333  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 20:38:02.927  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 20:38:02.930  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 20:38:02.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 20:38:02.937 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 20:38:02.939  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 20:38:02.939  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 20:38:02.943  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 20:38:02.944  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 20:38:03.025  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 20:38:03.025  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 20:38:03.026 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 20:38:03.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 20:38:03.027 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 20:38:03.037 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 20:38:03.037 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 20:38:03.038 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 20:38:03.043 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 20:38:03.142 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [06:2a:1a:f2:8d:c1:60:63:99:ca:f8:62:a4:a2:7c:20:c6:f2:83:47] modulus: 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 public exponent: 10001 ] 2021-04-29 21:25:00.760  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:25:00.763 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:25:00.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:25:00.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:25:00.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:25:00.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:25:00.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:25:00.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:25:00.769  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:25:00.823  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:25:00.826  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:25:00.827  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:25:00.831  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:25:01.071  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:25:01.072  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:25:01.073 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:25:01.076 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:25:01.078  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:25:01.078  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:25:01.081  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:25:01.082  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:25:01.121  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:25:01.122  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:25:01.122 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:25:01.122 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:25:01.122 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:25:01.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:25:01.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:25:01.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:25:01.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:25:01.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: b7ed085b24d88d41c3d14408796e9d89c46c3bf3c3f6f2e27f77087b258e55c039f972c35db265852da735cc9523908573abc6b8de57d4ffc5725f10add7dc5a574b83e11f7c4b4f65fa940d77e185e2cf041d1cf54d751765a4fb4b72924241695da38d4e483344d87ee5412265030f4fd1fa6306b0a0410721144a7d2ba4860e64751f1bef644f879cb1d973a6ba1e4ec58e6600bd05cc84e065f704f82532ad350c48537e2131741c5c2e88164afa202690501334c74723cfbd4aa779ee0b506b1d349b931bdf653f7d21fa1e6cbd3793ca66a73557bc1c32bc720aceec84e2a715b0cb1eb664432f5fdfd1bb01773d11afb1fd74812bce4a6ddcc4d93e5bfcdac675402256e3e69cd9604c266c5884ed0e9cd5e5953c607238fadaf3b9afad105ae388752ce2df3ea8501429687fa2cf5337508accabcfe730578b68ea65270e53eef5ef591176321f3f16eb1d4b97d694fbdfcfc989b3ed161454f656026b854fbe0953fdcb2595445801d73079bb165d653eba08403a9d95f585be9b0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:50:f0:bc:c2:bc:c1:9c:35:63:08:3a:e2:df:16:38:36:2e:9c:31] modulus: ce31eec476d7adf57d22f2dd4e9026e1b3a19f7754651e63e58fd6171c659fcc52278055e67c2210132d587be2fa5a19868e21b6eb291e24a4f47ac5e30e13356ef0001143582b9e94d9edb668f4c7114de68d56cb1c52099301c7a5ffd56066b54cec5457087a0a44bf773300531341f826211643534f783c5ae8423644c11dbd839ca58e7cedb02a64f77cb75279c10e10f0417880de71e826bc73a305a6366181a6cef90a4a386387537c68d6366ad12e01541bc53fb130e62a9cf25f6d52bfd6ab7023ed47a8fc1d78cca60266389fdd317cacb3a70a549ccda953259c22c6006f3b16edf5d8a51340b1b3e47231b56f2bbe443a5ad755b7fe7d7dd17fe9 public exponent: 10001 ] 2021-04-29 21:25:26.219  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:25:26.220 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:25:26.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-29 21:25:26.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:25:26.223  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-29 21:25:26.224  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:25:26.224  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:25:26.225  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:25:26.225  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:25:26.229  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:25:26.230  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:25:26.230  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:25:26.232  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:25:26.307  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:25:26.308  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:25:26.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:25:26.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:25:26.310  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:25:26.321  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:25:26.324  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:25:26.325  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:25:26.325  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:25:26.325  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:25:26.326 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:25:26.326 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:25:26.327 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:25:26.327 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:25:26.328 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:25:26.328 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:25:26.329 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:25:26.332 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:29:a5:2b:04:d1:5c:11:6d:54:db:fc:3b:dd:10:01:a1:67:8c:ca] modulus: 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 public exponent: 10001 ] 2021-04-29 21:29:48.502  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:29:48.521 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:29:48.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-29 21:29:48.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:29:48.525  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-29 21:29:48.526  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:29:48.527  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:29:48.527  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:29:48.528  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:29:48.535  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:29:48.536  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:29:48.537  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:29:48.540  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:29:48.776  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:29:48.777  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:29:48.777 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:29:48.780 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:29:48.781  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:29:48.781  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:29:48.783  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:29:48.783  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:29:48.784  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:29:48.784  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:29:48.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:29:48.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:29:48.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:29:48.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:29:48.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:29:48.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:29:48.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:29:48.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:e0:54:69:17:3e:4b:72:91:b6:05:7b:79:99:c7:c8:20:49:75:1e] modulus: e44ccf56799194f4134332de3aa70318cd20e506e3bafa6c39a9e55e72aaba551dd8414ab4efb03e55413c8237332b598b77b8a3522594fba843c63f067b84d13761bcc2605e79f19b5fe5381944921461548d6e97f278a1c232db3d96f5f63b6796643f7a37cd73536e8ddc6af843d1bafef2f19943d4350f876d0f59ebb5ccacfc09e86c3ffb960d2318bf984beacf7d9ac6d3dd73627fa58a9308ea0c1b9bb96287dac621ff48af6b44ff56d9fe91af2010603a2b25aae778c83a1c22c459d0fd0f998baf2e345a0c33a6cd9c851c5907d84b5d39cc1e215ca94181f250fd485f0812dee2d0dd8e29a9267879891898b80ff48b3bfe8ea492ce4ac9ac4ac1 public exponent: 10001 ] 2021-04-29 21:30:08.078  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:30:08.079 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:30:08.081 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-29 21:30:08.081 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:30:08.082  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-29 21:30:08.082  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:30:08.083  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:30:08.083  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:30:08.083  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:30:08.087  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:30:08.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:30:08.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:30:08.089  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:30:08.167  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:30:08.168  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:30:08.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:30:08.170 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:30:08.170  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:30:08.171  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:30:08.172  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:30:08.172  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:30:08.172  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:30:08.173  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:30:08.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:30:08.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:30:08.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:30:08.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:30:08.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:30:08.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:30:08.175 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:30:08.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:e3:b0:4e:d0:08:97:68:32:08:e7:cc:29:5f:1e:24:eb:52:97:7d] modulus: 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 public exponent: 10001 ] 2021-04-29 21:30:17.808  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:30:17.809 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:30:17.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-29 21:30:17.810 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:30:17.811  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-29 21:30:17.811  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:30:17.811  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:30:17.812  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:30:17.812  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:30:17.816  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:30:17.817  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:30:17.817  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:30:17.818  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:30:17.917  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:30:17.918  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:30:17.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:30:17.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:30:17.922  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:30:17.923  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:30:17.924  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:30:17.924  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:30:17.924  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:30:17.925  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:30:17.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:30:17.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:30:17.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:30:17.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:30:17.926 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:30:17.926 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:30:17.927 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:30:17.929 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:c8:10:46:82:59:05:a1:da:3c:89:01:63:17:a2:c4:9f:a7:b9:0d] modulus: 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 public exponent: 10001 ] 2021-04-29 21:30:52.909  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:30:52.910 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:30:52.911 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-29 21:30:52.912 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:30:52.912  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-29 21:30:52.913  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:30:52.913  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:30:52.914  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:30:52.914  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:30:52.918  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:30:52.919  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:30:52.920  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:30:52.921  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:30:53.026  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:30:53.026  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:30:53.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:30:53.028 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:30:53.028  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:30:53.028  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:30:53.029  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:30:53.029  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:30:53.030  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:30:53.030  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:30:53.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:30:53.031 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:30:53.031 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:30:53.032 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:30:53.032 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:30:53.032 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:30:53.033 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:30:53.041 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: b7ed085b24d88d41c3d14408796e9d89c46c3bf3c3f6f2e27f77087b258e55c039f972c35db265852da735cc9523908573abc6b8de57d4ffc5725f10add7dc5a574b83e11f7c4b4f65fa940d77e185e2cf041d1cf54d751765a4fb4b72924241695da38d4e483344d87ee5412265030f4fd1fa6306b0a0410721144a7d2ba4860e64751f1bef644f879cb1d973a6ba1e4ec58e6600bd05cc84e065f704f82532ad350c48537e2131741c5c2e88164afa202690501334c74723cfbd4aa779ee0b506b1d349b931bdf653f7d21fa1e6cbd3793ca66a73557bc1c32bc720aceec84e2a715b0cb1eb664432f5fdfd1bb01773d11afb1fd74812bce4a6ddcc4d93e5bfcdac675402256e3e69cd9604c266c5884ed0e9cd5e5953c607238fadaf3b9afad105ae388752ce2df3ea8501429687fa2cf5337508accabcfe730578b68ea65270e53eef5ef591176321f3f16eb1d4b97d694fbdfcfc989b3ed161454f656026b854fbe0953fdcb2595445801d73079bb165d653eba08403a9d95f585be9b0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:a6:73:d5:d7:cd:6e:b0:7c:18:66:b9:0d:73:ef:b6:ac:30:aa:e1] modulus: 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 public exponent: 10001 ] 2021-04-29 21:34:33.945  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:34:33.946 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:34:33.947 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-29 21:34:33.948 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:34:33.948  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-29 21:34:33.949  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:34:33.949  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:34:33.949  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:34:33.949  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:34:33.953  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:34:33.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:34:33.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:34:33.955  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:34:34.034  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:34:34.035  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:34:34.035 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:34:34.039 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:34:34.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:34:34.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:34:34.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:34:34.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:34:34.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:34:34.043  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:34:34.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:34:34.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:34:34.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:34:34.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:34:34.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:34:34.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:34:34.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:34:34.047 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [57:69:a5:68:2a:10:8d:42:32:be:bb:c0:25:d6:48:ad:5c:40:ec:33] modulus: 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 public exponent: 10001 ] 2021-04-29 21:35:37.167  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:35:37.168 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:35:37.170 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:35:37.171 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:35:37.171  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:35:37.172  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:35:37.172  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:35:37.173  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:35:37.173  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:35:37.178  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:35:37.178  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:35:37.179  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:35:37.180  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:35:37.268  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:35:37.269  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:35:37.269 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:35:37.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:35:37.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:35:37.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:35:37.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:35:37.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:35:37.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:35:37.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:35:37.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:35:37.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:35:37.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:35:37.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:35:37.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:35:37.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:35:37.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:35:37.323 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: b7ed085b24d88d41c3d14408796e9d89c46c3bf3c3f6f2e27f77087b258e55c039f972c35db265852da735cc9523908573abc6b8de57d4ffc5725f10add7dc5a574b83e11f7c4b4f65fa940d77e185e2cf041d1cf54d751765a4fb4b72924241695da38d4e483344d87ee5412265030f4fd1fa6306b0a0410721144a7d2ba4860e64751f1bef644f879cb1d973a6ba1e4ec58e6600bd05cc84e065f704f82532ad350c48537e2131741c5c2e88164afa202690501334c74723cfbd4aa779ee0b506b1d349b931bdf653f7d21fa1e6cbd3793ca66a73557bc1c32bc720aceec84e2a715b0cb1eb664432f5fdfd1bb01773d11afb1fd74812bce4a6ddcc4d93e5bfcdac675402256e3e69cd9604c266c5884ed0e9cd5e5953c607238fadaf3b9afad105ae388752ce2df3ea8501429687fa2cf5337508accabcfe730578b68ea65270e53eef5ef591176321f3f16eb1d4b97d694fbdfcfc989b3ed161454f656026b854fbe0953fdcb2595445801d73079bb165d653eba08403a9d95f585be9b0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:a5:17:44:f3:69:49:1a:bb:0a:93:ac:78:30:1a:4a:6d:66:94:9b] modulus: 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 public exponent: 10001 ] 2021-04-29 21:39:27.524  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:39:27.526 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:39:27.527 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-29 21:39:27.532 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:39:27.532  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-29 21:39:27.533  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:39:27.533  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:39:27.533  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:39:27.534  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:39:27.538  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:39:27.538  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:39:27.538  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:39:27.539  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:39:27.674  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:39:27.675  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:39:27.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:39:27.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:39:27.677  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:39:27.677  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:39:27.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:39:27.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:39:27.679  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:39:27.679  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:39:27.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:39:27.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:39:27.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:39:27.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:39:27.680 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:39:27.680 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:39:27.680 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:39:27.683 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: b7ed085b24d88d41c3d14408796e9d89c46c3bf3c3f6f2e27f77087b258e55c039f972c35db265852da735cc9523908573abc6b8de57d4ffc5725f10add7dc5a574b83e11f7c4b4f65fa940d77e185e2cf041d1cf54d751765a4fb4b72924241695da38d4e483344d87ee5412265030f4fd1fa6306b0a0410721144a7d2ba4860e64751f1bef644f879cb1d973a6ba1e4ec58e6600bd05cc84e065f704f82532ad350c48537e2131741c5c2e88164afa202690501334c74723cfbd4aa779ee0b506b1d349b931bdf653f7d21fa1e6cbd3793ca66a73557bc1c32bc720aceec84e2a715b0cb1eb664432f5fdfd1bb01773d11afb1fd74812bce4a6ddcc4d93e5bfcdac675402256e3e69cd9604c266c5884ed0e9cd5e5953c607238fadaf3b9afad105ae388752ce2df3ea8501429687fa2cf5337508accabcfe730578b68ea65270e53eef5ef591176321f3f16eb1d4b97d694fbdfcfc989b3ed161454f656026b854fbe0953fdcb2595445801d73079bb165d653eba08403a9d95f585be9b0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:90:aa:de:f5:58:eb:0b:35:c1:7d:a0:9e:ae:c6:94:b5:ba:36:2c] modulus: 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 public exponent: 10001 ] 2021-04-29 21:39:55.059  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:39:55.060 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:39:55.061 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-29 21:39:55.062 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:39:55.062  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-29 21:39:55.063  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:39:55.063  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:39:55.063  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:39:55.064  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:39:55.068  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:39:55.069  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:39:55.069  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:39:55.070  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:39:55.134  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:39:55.135  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:39:55.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:39:55.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:39:55.137  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:39:55.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:39:55.138  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:39:55.139  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:39:55.139  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:39:55.140  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:39:55.140 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:39:55.140 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:39:55.141 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:39:55.141 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:39:55.141 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:39:55.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:39:55.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:39:55.146 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:4e:03:3c:76:11:19:df:70:1a:a4:1c:ed:f3:8f:52:3f:37:4b:d1] modulus: 85cd1bb35a8e3597843d53a1e4434efba8ae7bc7120d4af09df762c7c19b09b3d43d6f3d68851800b020d41bc189eea82df2fa1faf49b7b736e38f472f88353831bdd6147ed61b1320bfb6c131406ac9a8d902f598505389dded7e0cf3ec63d3def13c4b31e70884adea25ffb83d633bc12d8d55dbd7cf4deabe012e91473b08efd532a703240906fb0264431b0b25e055416aa60559151522ff0fd8748fbb941b641d9277c6c5be8804499ae1fb5d1faa85d4d4082f2af5be2ea4657991c033f59e7337c72b1c2181cbe8cb8975a7c33f8c060ad3257682c1cb867d4764a9aaed3cd9d91541784577a8234a59b70009db9fc20b642666ef0abe20632869c255 public exponent: 10001 ] 2021-04-29 21:40:01.265  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:40:01.321 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:40:01.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-29 21:40:01.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:40:01.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-29 21:40:01.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:40:01.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:40:01.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:40:01.324  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:40:01.328  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:40:01.328  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:40:01.328  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:40:01.329  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:40:01.398  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:40:01.421  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:40:01.422 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:40:01.423 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:40:01.424  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:40:01.424  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:40:01.426  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:40:01.426  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:40:01.427  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:40:01.427  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:40:01.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:40:01.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:40:01.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:40:01.429 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:40:01.429 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:40:01.429 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:40:01.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:40:01.433 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [27:4e:b6:c0:7b:a9:c1:0a:29:20:ac:ff:d1:91:62:66:d9:bb:36:15] modulus: 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 public exponent: 10001 ] 2021-04-29 21:40:34.911  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:40:34.914 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:40:34.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-29 21:40:34.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:40:34.917  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-29 21:40:34.918  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:40:34.918  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:40:34.919  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:40:34.919  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:40:34.925  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:40:34.926  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:40:34.926  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:40:34.928  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:40:35.013  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:40:35.014  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:40:35.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:40:35.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:40:35.015  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:40:35.015  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:40:35.016  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:40:35.016  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:40:35.017  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:40:35.017  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:40:35.017 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:40:35.017 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:40:35.017 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:40:35.017 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:40:35.018 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:40:35.018 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:40:35.018 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:40:35.021 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:10:b1:24:d3:2f:7a:3f:f5:31:20:62:d2:db:af:2f:21:84:ef:99] modulus: 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 public exponent: 10001 ] 2021-04-29 21:41:06.104  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:41:06.106 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:41:06.107 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-29 21:41:06.107 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:41:06.107  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-29 21:41:06.108  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:41:06.108  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:41:06.108  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:41:06.108  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:41:06.112  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:41:06.112  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:41:06.112  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:41:06.113  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:41:06.196  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:41:06.197  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:41:06.197 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:41:06.199 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:41:06.199  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:41:06.199  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:41:06.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:41:06.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:41:06.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:41:06.201  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:41:06.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:41:06.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:41:06.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:41:06.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:41:06.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:41:06.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:41:06.202 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:41:06.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: b7ed085b24d88d41c3d14408796e9d89c46c3bf3c3f6f2e27f77087b258e55c039f972c35db265852da735cc9523908573abc6b8de57d4ffc5725f10add7dc5a574b83e11f7c4b4f65fa940d77e185e2cf041d1cf54d751765a4fb4b72924241695da38d4e483344d87ee5412265030f4fd1fa6306b0a0410721144a7d2ba4860e64751f1bef644f879cb1d973a6ba1e4ec58e6600bd05cc84e065f704f82532ad350c48537e2131741c5c2e88164afa202690501334c74723cfbd4aa779ee0b506b1d349b931bdf653f7d21fa1e6cbd3793ca66a73557bc1c32bc720aceec84e2a715b0cb1eb664432f5fdfd1bb01773d11afb1fd74812bce4a6ddcc4d93e5bfcdac675402256e3e69cd9604c266c5884ed0e9cd5e5953c607238fadaf3b9afad105ae388752ce2df3ea8501429687fa2cf5337508accabcfe730578b68ea65270e53eef5ef591176321f3f16eb1d4b97d694fbdfcfc989b3ed161454f656026b854fbe0953fdcb2595445801d73079bb165d653eba08403a9d95f585be9b0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:c3:07:17:11:86:e3:40:c5:71:23:dc:33:43:95:c7:14:55:de:83] modulus: 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 public exponent: 10001 ] 2021-04-29 21:42:21.150  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:42:21.151 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:42:21.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-04-29 21:42:21.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:42:21.153  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-04-29 21:42:21.153  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:42:21.153  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:42:21.153  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:42:21.153  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:42:21.225  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:42:21.226  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:42:21.227  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:42:21.227  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:42:21.323  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:42:21.324  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:42:21.324 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:42:21.326 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:42:21.326  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:42:21.327  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:42:21.328  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:42:21.328  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:42:21.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:42:21.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:42:21.329 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:42:21.330 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:42:21.330 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:42:21.331 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:42:21.331 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:42:21.331 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:42:21.332 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:42:21.422 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:2e:8c:ac:c3:09:f0:76:dd:41:dc:40:e3:34:09:4f:1e:07:dc:ca] modulus: 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 public exponent: 10001 ] 2021-04-29 21:42:37.744  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:42:37.744 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:42:37.745 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-29 21:42:37.745 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:42:37.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-29 21:42:37.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:42:37.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:42:37.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:42:37.746  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:42:37.749  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:42:37.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:42:37.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:42:37.751  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:42:37.824  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:42:37.825  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:42:37.825 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:42:37.826 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:42:37.826  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:42:37.826  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:42:37.827  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:42:37.827  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:42:37.828  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:42:37.828  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:42:37.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:42:37.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:42:37.828 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:42:37.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:42:37.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:42:37.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:42:37.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:42:37.832 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: b7ed085b24d88d41c3d14408796e9d89c46c3bf3c3f6f2e27f77087b258e55c039f972c35db265852da735cc9523908573abc6b8de57d4ffc5725f10add7dc5a574b83e11f7c4b4f65fa940d77e185e2cf041d1cf54d751765a4fb4b72924241695da38d4e483344d87ee5412265030f4fd1fa6306b0a0410721144a7d2ba4860e64751f1bef644f879cb1d973a6ba1e4ec58e6600bd05cc84e065f704f82532ad350c48537e2131741c5c2e88164afa202690501334c74723cfbd4aa779ee0b506b1d349b931bdf653f7d21fa1e6cbd3793ca66a73557bc1c32bc720aceec84e2a715b0cb1eb664432f5fdfd1bb01773d11afb1fd74812bce4a6ddcc4d93e5bfcdac675402256e3e69cd9604c266c5884ed0e9cd5e5953c607238fadaf3b9afad105ae388752ce2df3ea8501429687fa2cf5337508accabcfe730578b68ea65270e53eef5ef591176321f3f16eb1d4b97d694fbdfcfc989b3ed161454f656026b854fbe0953fdcb2595445801d73079bb165d653eba08403a9d95f585be9b0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:2b:16:8c:94:94:8f:63:da:40:9f:75:6d:cf:50:c2:ac:d6:10:04] modulus: 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 public exponent: 10001 ] 2021-04-29 21:45:53.008  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:45:53.009 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:45:53.010 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:45:53.011 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:45:53.011  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:45:53.011  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:45:53.011  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:45:53.012  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:45:53.012  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:45:53.016  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:45:53.017  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:45:53.017  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:45:53.018  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:45:53.089  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:45:53.090  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:45:53.090 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:45:53.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:45:53.091  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:45:53.091  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:45:53.092  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:45:53.092  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:45:53.092  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:45:53.093  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:45:53.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:45:53.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:45:53.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:45:53.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:45:53.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:45:53.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:45:53.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:45:53.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: b7ed085b24d88d41c3d14408796e9d89c46c3bf3c3f6f2e27f77087b258e55c039f972c35db265852da735cc9523908573abc6b8de57d4ffc5725f10add7dc5a574b83e11f7c4b4f65fa940d77e185e2cf041d1cf54d751765a4fb4b72924241695da38d4e483344d87ee5412265030f4fd1fa6306b0a0410721144a7d2ba4860e64751f1bef644f879cb1d973a6ba1e4ec58e6600bd05cc84e065f704f82532ad350c48537e2131741c5c2e88164afa202690501334c74723cfbd4aa779ee0b506b1d349b931bdf653f7d21fa1e6cbd3793ca66a73557bc1c32bc720aceec84e2a715b0cb1eb664432f5fdfd1bb01773d11afb1fd74812bce4a6ddcc4d93e5bfcdac675402256e3e69cd9604c266c5884ed0e9cd5e5953c607238fadaf3b9afad105ae388752ce2df3ea8501429687fa2cf5337508accabcfe730578b68ea65270e53eef5ef591176321f3f16eb1d4b97d694fbdfcfc989b3ed161454f656026b854fbe0953fdcb2595445801d73079bb165d653eba08403a9d95f585be9b0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:3a:1c:29:5e:7f:8c:de:c5:2d:c2:e4:18:dc:9b:72:1d:79:fd:e3] modulus: 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 public exponent: 10001 ] 2021-04-29 21:48:22.142  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:48:22.143 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:48:22.143 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:48:22.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:48:22.144  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:48:22.145  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:48:22.145  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:48:22.145  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:48:22.146  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:48:22.149  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:48:22.149  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:48:22.149  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:48:22.150  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:48:22.249  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:48:22.250  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:48:22.250 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:48:22.251 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:48:22.252  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:48:22.252  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:48:22.253  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:48:22.253  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:48:22.253  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:48:22.253  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:48:22.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:48:22.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:48:22.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:48:22.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:48:22.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:48:22.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:48:22.255 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:48:22.257 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cd:da:86:4f:c7:ec:1f:92:fd:4c:e0:67:c7:83:69:07:08:e4:13:4e] modulus: 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 public exponent: 10001 ] 2021-04-29 21:50:15.591  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:50:15.592 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:50:15.593 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:50:15.594 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:50:15.594  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:50:15.595  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:50:15.595  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:50:15.595  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:50:15.595  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:50:15.601  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:50:15.601  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:50:15.602  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:50:15.603  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:50:15.693  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:50:15.693  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:50:15.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:50:15.695 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:50:15.695  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:50:15.695  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:50:15.696  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:50:15.697  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:50:15.697  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:50:15.697  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:50:15.697 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:50:15.697 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:50:15.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:50:15.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:50:15.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:50:15.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:50:15.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:50:15.703 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: b7ed085b24d88d41c3d14408796e9d89c46c3bf3c3f6f2e27f77087b258e55c039f972c35db265852da735cc9523908573abc6b8de57d4ffc5725f10add7dc5a574b83e11f7c4b4f65fa940d77e185e2cf041d1cf54d751765a4fb4b72924241695da38d4e483344d87ee5412265030f4fd1fa6306b0a0410721144a7d2ba4860e64751f1bef644f879cb1d973a6ba1e4ec58e6600bd05cc84e065f704f82532ad350c48537e2131741c5c2e88164afa202690501334c74723cfbd4aa779ee0b506b1d349b931bdf653f7d21fa1e6cbd3793ca66a73557bc1c32bc720aceec84e2a715b0cb1eb664432f5fdfd1bb01773d11afb1fd74812bce4a6ddcc4d93e5bfcdac675402256e3e69cd9604c266c5884ed0e9cd5e5953c607238fadaf3b9afad105ae388752ce2df3ea8501429687fa2cf5337508accabcfe730578b68ea65270e53eef5ef591176321f3f16eb1d4b97d694fbdfcfc989b3ed161454f656026b854fbe0953fdcb2595445801d73079bb165d653eba08403a9d95f585be9b0b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:07:a1:82:b2:e4:8b:ad:62:2e:bc:1d:1e:9f:3f:39:c7:5d:df:81] modulus: 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 public exponent: 10001 ] 2021-04-29 21:51:44.107  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-29 21:51:44.108 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-29 21:51:44.109 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:51:44.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-29 21:51:44.110  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-29 21:51:44.110  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-29 21:51:44.110  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-29 21:51:44.111  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-29 21:51:44.111  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-29 21:51:44.115  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-29 21:51:44.115  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:51:44.115  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-29 21:51:44.116  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-29 21:51:44.240  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-29 21:51:44.241  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-29 21:51:44.241 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-29 21:51:44.242 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-29 21:51:44.242  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1202 2021-04-29 21:51:44.243  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-29 21:51:44.243  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-29 21:51:44.244  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-29 21:51:44.244  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-29 21:51:44.244  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-29 21:51:44.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:51:44.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:51:44.245 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:51:44.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-29 21:51:44.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-29 21:51:44.246 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-29 21:51:44.247 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-29 21:51:44.249 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 370184069298356456826089210384191110108082097712 IssuerDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 29 20:08:27 UTC 2021 Final Date: Tue Apr 29 20:08:27 UTC 2031 SubjectDN: UID=c-0264af0ed3c570d56,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b7:ea:e8:ef:d4:16:61:2f:77:93:97:2f:dc:58:ed:39:08:2f:6b:b7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 813e92a311418a9cf27b696af3ce0baa5b1703b8 5fd6a8e5cc325ec5285b4e293c8e4ff1a3a5066d 449e927376216c0ae840c87421c04434ab164b6d 3e6a9e4425f2606143a3c064208f0e2f95f2cf7c 79cc00c157db66fbb097880d78a4bb4d3d5a53f2 c55a7a0bdd941ddea7883d6938be2da5fd66d8e4 922b8a1d3a1f6a2a7ef73b7078f302a5c9dc476f 9af92dfa259729183ad5072d7c63ab69e44f42f4 4dec3beb1cda659ef548aa43b6effdebab03d2f0 f8e302ea63c066c8c0b44bab6bcdfe4a88410d7e bc52644e33c00c00327d595fee7d61a48b22a043 ec8f1129cfa661a53fbd67979eb93c3065ec8b5d 300e1645c4fa60b63c8010c5ad166ea1a169479c c150a9c16cbb675f624f730bf872f4790fe56bb7 cbb7f21233bea3af7988a29a2ba976c50f900254 ec979ba81c53cb9c7bbf37718c5dc2e3de42d006 b1fb9b38455d6da39c50d9bc653a4efbad1b1d85 478625762a040370d97baa0fb3b63c58253a00d8 1473472938794df8cf93f8668c3e73d946841a86 5902e19f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:e7:e1:73:92:e3:c4:03:94:52:5c:58:76:63:41:3f:1f:e3:a7:fa] modulus: 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 public exponent: 10001 ]