2021-04-19 17:27:06,330 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-04-19 17:27:10,539 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-04-19 17:27:14.024  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-04-19 17:27:26.434 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-04-19 17:27:27.624  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-04-19 17:27:28.336  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-04-19 17:27:43.034  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 39.282 seconds (JVM running for 47.206) 2021-04-19 17:53:52.636  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 17:53:52.645 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 17:53:52.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-19 17:53:52.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 17:53:52.836  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-04-19 17:53:52.841  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 17:53:52.927  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 17:53:52.928  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 17:53:52.929  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 17:53:52.948  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 17:53:53.027  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 17:53:53.135  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 17:53:53.144  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 17:53:53.145  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 17:53:53.235  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 17:53:55.341  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 17:53:55.345  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 17:53:55.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 17:53:55.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 17:53:55.434  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 17:53:55.435  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 17:53:55.439  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 17:53:55.440  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 17:53:55.876  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 17:53:55.927  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 17:53:55.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 17:53:55.928 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 17:53:55.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 17:53:55.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 17:53:55.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 17:53:55.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 17:53:56.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 17:53:56.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [06:89:b5:79:b5:56:7c:ba:b4:99:17:a5:fb:cb:cd:33:69:73:03:0d] modulus: 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 public exponent: 10001 ] 2021-04-19 19:04:23.021  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:04:23.022 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:04:23.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-19 19:04:23.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:04:23.026  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-19 19:04:23.027  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:04:23.028  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:04:23.028  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:04:23.029  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:04:23.035  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:04:23.036  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:04:23.037  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:04:23.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:04:23.268  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:04:23.325  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:04:23.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:04:23.329 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:04:23.330  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:04:23.331  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:04:23.334  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:04:23.334  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:04:23.335  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:04:23.336  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:04:23.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:04:23.337 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:04:23.337 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:04:23.338 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:04:23.338 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:04:23.338 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:04:23.340 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:04:23.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:9a:b4:94:3c:04:68:62:df:91:89:2f:c9:7b:38:02:9a:9c:14:78] modulus: 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 public exponent: 10001 ] 2021-04-19 19:05:56.529  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:05:56.530 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:05:56.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-19 19:05:56.532 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:05:56.533  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-19 19:05:56.534  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:05:56.534  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:05:56.535  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:05:56.537  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:05:56.546  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:05:56.547  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:05:56.547  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:05:56.549  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:05:56.741  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:05:56.741  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:05:56.742 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:05:56.745 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:05:56.747  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:05:56.748  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:05:56.751  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:05:56.752  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:05:56.753  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:05:56.753  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:05:56.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:05:56.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:05:56.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:05:56.824 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:05:56.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:05:56.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:05:56.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:05:56.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:7d:be:4b:1e:96:f9:f0:43:63:bf:cb:4d:8b:8a:f4:c8:79:40:7c] modulus: 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 public exponent: 10001 ] 2021-04-19 19:09:40.352  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:09:40.354 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:09:40.356 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-19 19:09:40.357 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:09:40.357  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-19 19:09:40.358  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:09:40.359  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:09:40.359  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:09:40.360  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:09:40.424  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:09:40.425  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:09:40.426  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:09:40.427  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:09:40.523  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:09:40.524  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:09:40.524 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:09:40.526 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:09:40.527  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:09:40.528  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:09:40.529  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:09:40.530  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:09:40.530  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:09:40.531  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:09:40.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:09:40.532 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:09:40.532 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:09:40.533 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:09:40.533 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:09:40.534 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:09:40.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:09:40.539 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:ef:0d:69:4c:6d:94:84:e1:09:72:80:4d:f5:86:10:16:ee:7b:a5] modulus: aafafafa6fce7d84ff092585d01b322fa9e7a62bda38aafc22834b5fba90b5b9dc1dbe0e15ee8aa6258a7ceeb28b7acd9af07b28749d7d562e5d8740b8e6cbab1f80891461f5f6333d88a717c5934b784c1cda3488ad601934a53caea31ca8c6f272713479fb1cfc756ee8876de1cd39b00970fd7d57d14a778cf1b1fba39fa6a6807f06ab37cf280b9d18ba6ffe451ec88ab26ee8ef70158246c6e700f4304ba8094e42fd6414eda1ee7c7f0fe1e224b1a8387140bb4470fb1a8848e939b9acf01a04e6e1481a6a69d36cdae349ab81474f61323026caf2aba577b70fd2431f9f27d7a841e71be897d1a4d4a9de9d49bd6dff8e2ad7ce71b5f0af8eb330166f public exponent: 10001 ] 2021-04-19 19:09:56.330  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:09:56.332 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:09:56.334 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-19 19:09:56.335 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:09:56.336  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] } 2021-04-19 19:09:56.337  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:09:56.338  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:09:56.339  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:09:56.339  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:09:56.344  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:09:56.344  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:09:56.345  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:09:56.346  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:09:56.411  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:09:56.412  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:09:56.424 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:09:56.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:09:56.426  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:09:56.427  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:09:56.429  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:09:56.429  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:09:56.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:09:56.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:09:56.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:09:56.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:09:56.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:09:56.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:09:56.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:09:56.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:09:56.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:09:56.438 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:5b:37:aa:3b:1d:1e:c2:25:10:0f:fe:31:c8:18:2c:48:bc:2e:7d] modulus: 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 public exponent: 10001 ] 2021-04-19 19:10:31.195  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:10:31.196 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:10:31.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-19 19:10:31.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:10:31.199  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] } 2021-04-19 19:10:31.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:10:31.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:10:31.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:10:31.201  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:10:31.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:10:31.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:10:31.206  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:10:31.207  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:10:31.324  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:10:31.325  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:10:31.325 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:10:31.328 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:10:31.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:10:31.329  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:10:31.331  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:10:31.332  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:10:31.332  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:10:31.332  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:10:31.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:10:31.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:10:31.333 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:10:31.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:10:31.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:10:31.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:10:31.335 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:10:31.338 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:55:f9:98:7e:32:77:2a:cd:f8:41:ae:f2:fe:12:7b:c1:96:e9:01] modulus: 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 public exponent: 10001 ] 2021-04-19 19:10:38.539  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:10:38.541 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:10:38.542 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-19 19:10:38.542 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:10:38.543  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-19 19:10:38.543  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:10:38.544  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:10:38.544  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:10:38.545  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:10:38.553  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:10:38.554  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:10:38.554  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:10:38.555  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:10:38.723  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:10:38.723  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:10:38.724 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:10:38.725 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:10:38.725  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:10:38.725  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:10:38.726  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:10:38.727  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:10:38.727  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:10:38.727  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:10:38.727 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:10:38.728 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:10:38.728 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:10:38.729 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:10:38.729 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:10:38.729 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:10:38.730 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:10:38.732 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: b427052fb0bb4ce349e50f5662ff7333be4d6a57c048ba87c936c73a2673585d19c7175749a4e18f4afd37256f67724c93a21ab7409254cbf3312cd372484c2ada9fd09977a887d042e179ce68c79c2fc62c32e4f131934864c15d9a809fc5850daa65fc0e3b82af463409ef29d58118da8231fdb3f06b485c5317b8eb9c324ee1c97a3ad0fe0e5e8ff870636f904761d57726294a7d617eea412e91427f297bae501089df3086239921ba5612f6d4743a7a87fb3c6d0ecd897ec99e02546125f119eabd2c8b9d85f08e508f3535427b52f295deda2669c8001e87cd2d39e0c9393044348acb3654ebd8e228c150ae64c516e10ca5b04e29239cadd380501a65c893335ceb0c7677ccf347dd57ba7613f08df6bd44ec42618fda6b6cbb472ecb8349fef40b0e69ca57c2f2a78cc1c0f854a431cd48fe9c8807cfe672129a727e4bacb0c7839817334e8cfa748084a12b532aa7299fe889f48d13b31f3667c2afc5a9bb376cde29da49f4df7f34c9567cdd40963c43926fc92874461b46ba43d5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:85:c2:12:f9:85:28:e1:d0:a5:d3:d6:6a:c9:23:fc:18:a0:57:3f] modulus: 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 public exponent: 10001 ] 2021-04-19 19:12:33.738  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:12:33.739 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:12:33.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-04-19 19:12:33.741 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:12:33.741  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] } 2021-04-19 19:12:33.742  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:12:33.742  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:12:33.742  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:12:33.743  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:12:33.747  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:12:33.747  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:12:33.748  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:12:33.749  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:12:33.850  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:12:33.851  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:12:33.851 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:12:33.854 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:12:33.855  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:12:33.856  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:12:33.858  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:12:33.859  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:12:33.860  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:12:33.860  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:12:33.861 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:12:33.861 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:12:33.862 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:12:33.863 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:12:33.863 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:12:33.864 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:12:33.864 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:12:33.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:52:af:09:3c:32:7e:d8:35:d0:31:b0:86:7e:e9:3b:c1:6d:d1:17] modulus: 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 public exponent: 10001 ] 2021-04-19 19:12:45.261  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:12:45.263 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:12:45.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-19 19:12:45.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:12:45.266  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-19 19:12:45.266  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:12:45.267  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:12:45.267  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:12:45.268  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:12:45.273  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:12:45.273  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:12:45.274  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:12:45.275  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:12:45.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:12:45.351  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:12:45.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:12:45.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:12:45.353  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:12:45.353  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:12:45.354  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:12:45.355  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:12:45.355  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:12:45.356  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:12:45.356 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:12:45.356 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:12:45.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:12:45.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:12:45.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:12:45.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:12:45.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:12:45.362 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bf:20:6f:a0:01:70:91:1d:f9:6b:d1:3e:ac:4c:56:e1:81:b9:44:88] modulus: 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 public exponent: 10001 ] 2021-04-19 19:15:45.084  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:15:45.085 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:15:45.086 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-19 19:15:45.086 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:15:45.087  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-19 19:15:45.087  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:15:45.087  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:15:45.087  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:15:45.088  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:15:45.092  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:15:45.093  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:15:45.093  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:15:45.094  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:15:45.207  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:15:45.208  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:15:45.209 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:15:45.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:15:45.211  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:15:45.212  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:15:45.224  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:15:45.225  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:15:45.226  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:15:45.226  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:15:45.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:15:45.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:15:45.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:15:45.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:15:45.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:15:45.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:15:45.229 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:15:45.232 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cd:2d:4e:a7:7d:8b:54:9a:05:2a:d2:5e:eb:63:98:6d:e4:1f:d3:12] modulus: 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 public exponent: 10001 ] 2021-04-19 19:19:14.956  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:19:14.957 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:19:14.958 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-19 19:19:14.959 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:19:14.959  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-19 19:19:14.960  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:19:14.960  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:19:14.960  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:19:14.961  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:19:14.965  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:19:14.966  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:19:14.966  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:19:14.967  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:19:15.106  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:19:15.106  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:19:15.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:19:15.108 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:19:15.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:19:15.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:19:15.111  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:19:15.112  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:19:15.112  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:19:15.113  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:19:15.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:19:15.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:19:15.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:19:15.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:19:15.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:19:15.114 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:19:15.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:19:15.125 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:14:c1:93:56:f2:38:f8:81:ee:f8:b6:f1:02:17:9e:6d:fa:65:d9] modulus: 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 public exponent: 10001 ] 2021-04-19 19:20:07.872  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:20:07.873 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:20:07.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-19 19:20:07.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:20:07.876  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-19 19:20:07.876  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:20:07.877  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:20:07.877  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:20:07.877  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:20:07.883  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:20:07.884  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:20:07.884  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:20:07.886  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:20:07.959  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:20:07.960  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:20:07.960 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:20:07.962 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:20:07.962  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:20:07.962  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:20:07.964  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:20:07.964  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:20:07.964  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:20:07.964  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:20:07.965 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:20:07.965 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:20:07.965 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:20:07.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:20:07.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:20:07.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:20:07.967 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:20:07.969 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:7b:b4:48:2e:7f:9d:8d:7b:3f:89:54:9d:79:dc:5a:2d:9d:78:1f] modulus: 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 public exponent: 10001 ] 2021-04-19 19:21:03.548  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:21:03.549 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:21:03.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-19 19:21:03.551 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:21:03.551  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-19 19:21:03.551  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:21:03.552  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:21:03.552  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:21:03.552  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:21:03.557  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:21:03.557  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:21:03.558  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:21:03.558  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:21:03.667  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:21:03.668  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:21:03.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:21:03.669 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:21:03.669  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:21:03.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:21:03.670  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:21:03.671  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:21:03.671  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:21:03.671  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:21:03.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:21:03.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:21:03.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:21:03.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:21:03.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:21:03.673 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:21:03.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:21:03.676 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:fd:c8:3c:f8:09:ea:bc:d6:85:51:c2:d9:c5:01:6f:0d:1d:4c:d2] modulus: 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 public exponent: 10001 ] 2021-04-19 19:21:40.235  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:21:40.237 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:21:40.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-19 19:21:40.239 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:21:40.239  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-19 19:21:40.239  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:21:40.239  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:21:40.239  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:21:40.240  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:21:40.243  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:21:40.244  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:21:40.244  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:21:40.245  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:21:40.328  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:21:40.329  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:21:40.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:21:40.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:21:40.332  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:21:40.332  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:21:40.334  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:21:40.334  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:21:40.335  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:21:40.335  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:21:40.335 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:21:40.336 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:21:40.336 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:21:40.337 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:21:40.337 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:21:40.337 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:21:40.338 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:21:40.342 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: b427052fb0bb4ce349e50f5662ff7333be4d6a57c048ba87c936c73a2673585d19c7175749a4e18f4afd37256f67724c93a21ab7409254cbf3312cd372484c2ada9fd09977a887d042e179ce68c79c2fc62c32e4f131934864c15d9a809fc5850daa65fc0e3b82af463409ef29d58118da8231fdb3f06b485c5317b8eb9c324ee1c97a3ad0fe0e5e8ff870636f904761d57726294a7d617eea412e91427f297bae501089df3086239921ba5612f6d4743a7a87fb3c6d0ecd897ec99e02546125f119eabd2c8b9d85f08e508f3535427b52f295deda2669c8001e87cd2d39e0c9393044348acb3654ebd8e228c150ae64c516e10ca5b04e29239cadd380501a65c893335ceb0c7677ccf347dd57ba7613f08df6bd44ec42618fda6b6cbb472ecb8349fef40b0e69ca57c2f2a78cc1c0f854a431cd48fe9c8807cfe672129a727e4bacb0c7839817334e8cfa748084a12b532aa7299fe889f48d13b31f3667c2afc5a9bb376cde29da49f4df7f34c9567cdd40963c43926fc92874461b46ba43d5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:dd:1e:30:a2:bc:db:8f:be:44:e8:99:ca:a8:a1:be:40:6e:0e:c7] modulus: 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 public exponent: 10001 ] 2021-04-19 19:22:32.363  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:22:32.365 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:22:32.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-19 19:22:32.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:22:32.367  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] } 2021-04-19 19:22:32.367  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:22:32.368  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:22:32.368  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:22:32.368  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:22:32.372  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:22:32.372  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:22:32.372  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:22:32.373  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:22:32.466  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:22:32.467  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:22:32.467 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:22:32.468 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:22:32.469  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:22:32.469  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:22:32.470  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:22:32.471  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:22:32.471  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:22:32.471  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:22:32.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:22:32.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:22:32.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:22:32.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:22:32.473 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:22:32.473 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:22:32.474 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:22:32.476 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3f:fe:08:fa:a1:72:a2:6a:39:cc:22:6f:69:af:e0:e0:bc:f6:88:10] modulus: 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 public exponent: 10001 ] 2021-04-19 19:26:30.779  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:26:30.781 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:26:30.785 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-19 19:26:30.786 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:26:30.786  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] } 2021-04-19 19:26:30.787  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:26:30.787  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:26:30.788  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:26:30.788  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:26:30.796  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:26:30.797  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:26:30.797  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:26:30.798  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:26:30.902  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:26:30.903  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:26:30.903 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:26:30.904 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:26:30.905  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:26:30.905  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:26:30.906  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:26:30.906  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:26:30.907  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:26:30.907  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:26:30.907 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:26:30.907 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:26:30.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:26:30.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:26:30.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:26:30.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:26:30.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:26:30.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:f4:e6:67:de:4b:2a:1d:0e:ef:0c:5d:7d:fc:92:11:68:15:ca:2e] modulus: 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 public exponent: 10001 ] 2021-04-19 19:27:48.261  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:27:48.262 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:27:48.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-19 19:27:48.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:27:48.263  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] } 2021-04-19 19:27:48.264  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:27:48.264  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:27:48.264  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:27:48.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:27:48.268  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:27:48.269  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:27:48.269  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:27:48.270  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:27:48.362  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:27:48.362  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:27:48.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:27:48.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:27:48.365  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:27:48.365  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:27:48.367  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:27:48.367  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:27:48.368  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:27:48.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:27:48.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:27:48.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:27:48.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:27:48.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:27:48.371 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:27:48.371 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:27:48.372 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:27:48.375 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:c0:3c:6c:58:80:b2:04:e5:6d:8e:fc:1b:f6:21:0e:c7:51:40:d9] modulus: 847880c1ed102f22390f0b41bfe1a9ee1f93dcbdc8a4407618605c1d6b1f01290deca390527d8065b66b42d194830fa97d28b09ce75e91d4b019234b1d281e37ba42344b37b9320f2708cb93b6d13a8fb72dd38ae475f2ab47a061623c638ca6fcd9c664a560d30a1b0c795931dd68306bf64f4545deb50a58098ae6ef7e2cd42e001aa25de70dcc735b5a1954ee6085e973fbae284335f053f1604f5e29b29cebcdd7795cb6f3b63f22dce3cf24a308abe85015c189471309c40fe3a3849fd102e02dda70e9ed9e18075f8394f1ce65d151d97ca70d238b6cb8837da9c81e51deea65498b764f225a5a38c64f1528bd1e07412ea99ed880b0f108daa6f9078f public exponent: 10001 ] 2021-04-19 19:29:16.848  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate signing request for CA named: RA 2021-04-19 19:29:16.850 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-04-19 19:29:16.851 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Received CSR meta data: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-19 19:29:16.852 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-04-19 19:29:16.853  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory  : Sending sign request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-04-19 19:29:16.853  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Validate before creating Certificate Request for CA :RA in Mode RA 2021-04-19 19:29:16.854  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-04-19 19:29:16.854  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-04-19 19:29:16.854  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-04-19 19:29:16.859  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-04-19 19:29:16.859  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:29:16.859  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-04-19 19:29:16.860  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-04-19 19:29:16.934  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-04-19 19:29:16.935  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type: 1 2021-04-19 19:29:16.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying signature of the response. 2021-04-19 19:29:16.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying PasswordBased Protection of the Response. 2021-04-19 19:29:16.937  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1238 2021-04-19 19:29:16.938  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26 2021-04-19 19:29:16.940  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2 2021-04-19 19:29:16.940  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server. 2021-04-19 19:29:16.941  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Response status code: 0 2021-04-19 19:29:16.941  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-04-19 19:29:16.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:29:16.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:29:16.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:29:16.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-04-19 19:29:16.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-04-19 19:29:16.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-04-19 19:29:16.944 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart 2021-04-19 19:29:16.946 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 324698631241673474587401046655213993103184188399 IssuerDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 19 17:20:56 UTC 2021 Final Date: Sat Apr 19 17:20:56 UTC 2031 SubjectDN: UID=c-07c844c6375991280,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [11:db:3d:69:c0:48:54:68:a4:54:19:03:d4:34:2c:e6:67:eb:bd:96] modulus: b427052fb0bb4ce349e50f5662ff7333be4d6a57c048ba87c936c73a2673585d19c7175749a4e18f4afd37256f67724c93a21ab7409254cbf3312cd372484c2ada9fd09977a887d042e179ce68c79c2fc62c32e4f131934864c15d9a809fc5850daa65fc0e3b82af463409ef29d58118da8231fdb3f06b485c5317b8eb9c324ee1c97a3ad0fe0e5e8ff870636f904761d57726294a7d617eea412e91427f297bae501089df3086239921ba5612f6d4743a7a87fb3c6d0ecd897ec99e02546125f119eabd2c8b9d85f08e508f3535427b52f295deda2669c8001e87cd2d39e0c9393044348acb3654ebd8e228c150ae64c516e10ca5b04e29239cadd380501a65c893335ceb0c7677ccf347dd57ba7613f08df6bd44ec42618fda6b6cbb472ecb8349fef40b0e69ca57c2f2a78cc1c0f854a431cd48fe9c8807cfe672129a727e4bacb0c7839817334e8cfa748084a12b532aa7299fe889f48d13b31f3667c2afc5a9bb376cde29da49f4df7f34c9567cdd40963c43926fc92874461b46ba43d5 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 61bcf5ece62bc4dece8f0e31614f1ca659c25a28 6f1bf921448d30e3663a187045ee610fedc8ab74 7f535829aa022410be7e807362b46c44ea23405b b23531e8710663889172ca3b662c201f195209d8 f0792de1a941fb9001425e18a720846173421cab 6c919188d6ae1db765e4d1d5cf5105b8775426e5 73ca9f7eb042e45b285e775a2a4170da4cea7430 d68cb21d4818e260a78b7ae33acd2c7f9cc81d25 f5667da83479852db1813ec1013c83338f21eab4 5fdc360626760522f0637137ef1f3f446ec10a64 6670379257f6f77e0951dbd198c15c74f95e4d32 662b84e46474a77ae05670b994c0413b7e453371 43d2c0af5cf0b5b31f111a44954dcff385ae26a2 17436b8bd916d83e57804edef4cb11eafcaeec0e b265cc41d013e41047b7585fab7a1f4802cff4d3 b872ac1e9b60fefaf231f2c6aab54db232c86593 7d83b1722b1522afce4730f6868770e4d3ad46f2 2adb3602568a47abdf9e339f41e19c1525d8590b fc1778eade15791b648eb0996bef1cab55c99711 c65747a7 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:58:5c:ac:61:21:2d:8d:77:50:fe:54:d8:6f:37:97:38:f4:81:c8] modulus: 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 public exponent: 10001 ]