Results

By type

          2021-08-15 06:32:09,231 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-08-15 06:32:09,995 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-08-15 06:32:10.725  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-08-15 06:32:13.211 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-08-15 06:32:13.453  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-08-15 06:32:13.619  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-08-15 06:32:15.874  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.245 seconds (JVM running for 8.931)
2021-08-15 06:38:28.625  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-15 06:38:28.636 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-15 06:38:28.680 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-08-15 06:38:28.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-15 06:38:28.702  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-08-15 06:38:28.707  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-15 06:38:28.713  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-15 06:38:28.713  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 06:38:28.714  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-15 06:38:28.721  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-15 06:38:28.726  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-15 06:38:28.763  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-15 06:38:28.772  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 06:38:28.773  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 06:38:28.797  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-15 06:38:29.352  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-15 06:38:29.355  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-15 06:38:29.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-15 06:38:29.362 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-15 06:38:29.364  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1087
2021-08-15 06:38:29.364  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-15 06:38:29.367  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-15 06:38:29.367  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-15 06:38:29.374  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-15 06:38:29.375  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-15 06:38:29.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 06:38:29.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 06:38:29.377 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 06:38:29.388 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 06:38:29.389 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 06:38:29.389 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 06:38:29.399 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-15 06:38:29.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 35887497365194410167136715202271001149483830043
             IssuerDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 15 06:28:43 UTC 2021
           Final Date: Fri Aug 15 06:28:42 UTC 2031
            SubjectDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [66:c5:83:e4:af:d1:f4:f6:ec:e0:89:eb:28:96:7c:f5:91:2b:7d:fe]
            modulus: dd3d0f7fa260ee1ba70d6292269902f3b73f75aa48bd44c1d9b0b60d5a3c51457bd42f22eea3dda945ccc89356c5a8f076993f257fedd0ad5bea03efd920bca7c0869117cc4ebdcf7fe108d613152eb36134670652e64af651852dba5cc643d91647da9037a746159ce1af2fd778239ad083e4ea55799a317ae37ee6bdb855daa1c349e71b8bb41732f7f402915db89de6f18007765e621670cf241210d6cb4c7fb5f450ff52e6eda1d93558bcdc2af42a4ccf74a96a165d5d5ec7a7ae7e100c7fe1e0a32b45936f196c10822fe703c7e80f6d0a2b18565fc72613799273f9fb809610525662803035f88aaf119d6d578310cf32d63cba58c0ed4aefe5d056e39d2edd0df9615df3fa8d9c62813c8aa8669e346157b3445d45f0f496686cef849f4e03f08d33c5538effe2af20c7a1d57042ce89ea94450d21b6f6b46678480c8aebb59ae7ffc5947b951f7005fbf91a32f6483229db416c5eb229783b4da3cb1be8b34de72f929a061ea494f5c0ae37aaaee526b3950d2c60bb3c508e20670d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a100a2c732c5fb98c4224effb39c53cf5526d28
                       7f760e613f6a86af45f97f00758922053a6331ba
                       816a4217a4c595fe7b51e4644d1645df690c8d1b
                       5c41ddc93d0358c97e06e4661e7e3391bd06072a
                       57436e41c666725e19988e8f2ea2349e4647a8ef
                       baddfbf5f6c3e91ac13c758ce35f37ee062b4b39
                       1dbe9c977a76946c646bf3684c2b53c3a4af2908
                       b42f33f2fd4f29f4bd6cc56ebb15f91835097c13
                       80bf21e4a6d419afdba3630a61c5fe6d1eaf96eb
                       8853b936a181de2391fa6c0cd286810b8be55260
                       c9f61a71dbb9d79f04614509de1773753a5b29a6
                       5a7e0c872175464de6a0dca0d1cc90d4b0eb0825
                       c81992df5def632d86201d115406fd8375f96532
                       8f9627cd7697d262c9749b39baaef1cd1e93a9f4
                       4a5944424c4fbdb097c40caf9d387f5580f7243f
                       5f44f7005337f29677e5eeb902b1cef85b5b1e11
                       c84af62f7b28c3024c001d402d1e71fbbb9c253e
                       c72e6c118c49b74b43722314138c8626adf54ee7
                       d8c50f494f02caa117bc1761de863c67599db649
                       de81ecc1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:e3:8e:35:8a:63:8c:2a:79:f9:bf:b9:10:7f:98:40:8d:4d:c6:fc]
            modulus: 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
    public exponent: 10001

] 
2021-08-15 08:40:28.493  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-15 08:40:28.497 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-15 08:40:28.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-15 08:40:28.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-15 08:40:28.505  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-15 08:40:28.506  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-15 08:40:28.507  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-15 08:40:28.508  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-15 08:40:28.509  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-15 08:40:28.524  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-15 08:40:28.526  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:40:28.526  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:40:28.530  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-15 08:40:28.714  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-15 08:40:28.715  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-15 08:40:28.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-15 08:40:28.719 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-15 08:40:28.720  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1087
2021-08-15 08:40:28.720  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-15 08:40:28.722  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-15 08:40:28.723  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-15 08:40:28.723  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-15 08:40:28.724  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-15 08:40:28.725 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:40:28.725 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:40:28.725 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:40:28.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:40:28.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:40:28.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:40:28.729 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-15 08:40:28.735 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 35887497365194410167136715202271001149483830043
             IssuerDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 15 06:28:43 UTC 2021
           Final Date: Fri Aug 15 06:28:42 UTC 2031
            SubjectDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [66:c5:83:e4:af:d1:f4:f6:ec:e0:89:eb:28:96:7c:f5:91:2b:7d:fe]
            modulus: dd3d0f7fa260ee1ba70d6292269902f3b73f75aa48bd44c1d9b0b60d5a3c51457bd42f22eea3dda945ccc89356c5a8f076993f257fedd0ad5bea03efd920bca7c0869117cc4ebdcf7fe108d613152eb36134670652e64af651852dba5cc643d91647da9037a746159ce1af2fd778239ad083e4ea55799a317ae37ee6bdb855daa1c349e71b8bb41732f7f402915db89de6f18007765e621670cf241210d6cb4c7fb5f450ff52e6eda1d93558bcdc2af42a4ccf74a96a165d5d5ec7a7ae7e100c7fe1e0a32b45936f196c10822fe703c7e80f6d0a2b18565fc72613799273f9fb809610525662803035f88aaf119d6d578310cf32d63cba58c0ed4aefe5d056e39d2edd0df9615df3fa8d9c62813c8aa8669e346157b3445d45f0f496686cef849f4e03f08d33c5538effe2af20c7a1d57042ce89ea94450d21b6f6b46678480c8aebb59ae7ffc5947b951f7005fbf91a32f6483229db416c5eb229783b4da3cb1be8b34de72f929a061ea494f5c0ae37aaaee526b3950d2c60bb3c508e20670d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a100a2c732c5fb98c4224effb39c53cf5526d28
                       7f760e613f6a86af45f97f00758922053a6331ba
                       816a4217a4c595fe7b51e4644d1645df690c8d1b
                       5c41ddc93d0358c97e06e4661e7e3391bd06072a
                       57436e41c666725e19988e8f2ea2349e4647a8ef
                       baddfbf5f6c3e91ac13c758ce35f37ee062b4b39
                       1dbe9c977a76946c646bf3684c2b53c3a4af2908
                       b42f33f2fd4f29f4bd6cc56ebb15f91835097c13
                       80bf21e4a6d419afdba3630a61c5fe6d1eaf96eb
                       8853b936a181de2391fa6c0cd286810b8be55260
                       c9f61a71dbb9d79f04614509de1773753a5b29a6
                       5a7e0c872175464de6a0dca0d1cc90d4b0eb0825
                       c81992df5def632d86201d115406fd8375f96532
                       8f9627cd7697d262c9749b39baaef1cd1e93a9f4
                       4a5944424c4fbdb097c40caf9d387f5580f7243f
                       5f44f7005337f29677e5eeb902b1cef85b5b1e11
                       c84af62f7b28c3024c001d402d1e71fbbb9c253e
                       c72e6c118c49b74b43722314138c8626adf54ee7
                       d8c50f494f02caa117bc1761de863c67599db649
                       de81ecc1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:86:27:a6:f6:4a:2e:4a:e3:66:2a:b2:c5:5c:48:7c:db:30:0e:b0]
            modulus: b7d6ee6516086af2dd9a85e7d70868137daeedebf5962b76f159152372a0604f84c0465faed9da88e75692868f798b16055b9d03b08328193429e094277227c6a9ebe84374f2fd7a6d20b9a6d3635b927bd0930e0443916927991ead482a5923098c0d79cd0c4861c6e3d657aa182a7d597607bbf04db4020632e9a0309706ed9221daa0e54edbfb129be859de3793683fd3112185406381026a9b86f8baeecf3582aaa426c062f096aa470e8c06638ef6aa4beafc18047937a7021ac951185b09b7a67764bc9c08a40ca95e6c5c270f995e266b70a216b31ef673413e5df7696358e298c13f04999c51684b467a5d9e5825efa19e10721281fb0dbd40fa11b3
    public exponent: 10001

] 
2021-08-15 08:42:01.189  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-15 08:42:01.191 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-15 08:42:01.194 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-15 08:42:01.195 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-15 08:42:01.196  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-15 08:42:01.197  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-15 08:42:01.197  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-15 08:42:01.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-15 08:42:01.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-15 08:42:01.204  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-15 08:42:01.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:42:01.205  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:42:01.207  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-15 08:42:01.359  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-15 08:42:01.359  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-15 08:42:01.360 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-15 08:42:01.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-15 08:42:01.363  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1087
2021-08-15 08:42:01.364  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-15 08:42:01.365  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-15 08:42:01.366  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-15 08:42:01.366  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-15 08:42:01.367  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-15 08:42:01.367 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:42:01.368 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:42:01.368 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:42:01.369 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:42:01.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:42:01.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:42:01.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-15 08:42:01.376 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 35887497365194410167136715202271001149483830043
             IssuerDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 15 06:28:43 UTC 2021
           Final Date: Fri Aug 15 06:28:42 UTC 2031
            SubjectDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [66:c5:83:e4:af:d1:f4:f6:ec:e0:89:eb:28:96:7c:f5:91:2b:7d:fe]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a100a2c732c5fb98c4224effb39c53cf5526d28
                       7f760e613f6a86af45f97f00758922053a6331ba
                       816a4217a4c595fe7b51e4644d1645df690c8d1b
                       5c41ddc93d0358c97e06e4661e7e3391bd06072a
                       57436e41c666725e19988e8f2ea2349e4647a8ef
                       baddfbf5f6c3e91ac13c758ce35f37ee062b4b39
                       1dbe9c977a76946c646bf3684c2b53c3a4af2908
                       b42f33f2fd4f29f4bd6cc56ebb15f91835097c13
                       80bf21e4a6d419afdba3630a61c5fe6d1eaf96eb
                       8853b936a181de2391fa6c0cd286810b8be55260
                       c9f61a71dbb9d79f04614509de1773753a5b29a6
                       5a7e0c872175464de6a0dca0d1cc90d4b0eb0825
                       c81992df5def632d86201d115406fd8375f96532
                       8f9627cd7697d262c9749b39baaef1cd1e93a9f4
                       4a5944424c4fbdb097c40caf9d387f5580f7243f
                       5f44f7005337f29677e5eeb902b1cef85b5b1e11
                       c84af62f7b28c3024c001d402d1e71fbbb9c253e
                       c72e6c118c49b74b43722314138c8626adf54ee7
                       d8c50f494f02caa117bc1761de863c67599db649
                       de81ecc1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:ba:67:9f:36:d4:70:55:bb:a0:26:f9:38:64:18:ac:83:a2:a4:b6]
            modulus: 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
    public exponent: 10001

] 
2021-08-15 08:44:17.456  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-15 08:44:17.459 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-15 08:44:17.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-15 08:44:17.466 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-15 08:44:17.466  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-15 08:44:17.470  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-15 08:44:17.470  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-15 08:44:17.471  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-15 08:44:17.472  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-15 08:44:17.478  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-15 08:44:17.479  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:44:17.479  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:44:17.481  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-15 08:44:17.617  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-15 08:44:17.618  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-15 08:44:17.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-15 08:44:17.621 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-15 08:44:17.622  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1087
2021-08-15 08:44:17.623  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-15 08:44:17.624  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-15 08:44:17.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-15 08:44:17.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-15 08:44:17.626  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-15 08:44:17.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:44:17.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:44:17.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:44:17.628 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:44:17.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:44:17.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:44:17.630 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-15 08:44:17.634 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 35887497365194410167136715202271001149483830043
             IssuerDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 15 06:28:43 UTC 2021
           Final Date: Fri Aug 15 06:28:42 UTC 2031
            SubjectDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [66:c5:83:e4:af:d1:f4:f6:ec:e0:89:eb:28:96:7c:f5:91:2b:7d:fe]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a100a2c732c5fb98c4224effb39c53cf5526d28
                       7f760e613f6a86af45f97f00758922053a6331ba
                       816a4217a4c595fe7b51e4644d1645df690c8d1b
                       5c41ddc93d0358c97e06e4661e7e3391bd06072a
                       57436e41c666725e19988e8f2ea2349e4647a8ef
                       baddfbf5f6c3e91ac13c758ce35f37ee062b4b39
                       1dbe9c977a76946c646bf3684c2b53c3a4af2908
                       b42f33f2fd4f29f4bd6cc56ebb15f91835097c13
                       80bf21e4a6d419afdba3630a61c5fe6d1eaf96eb
                       8853b936a181de2391fa6c0cd286810b8be55260
                       c9f61a71dbb9d79f04614509de1773753a5b29a6
                       5a7e0c872175464de6a0dca0d1cc90d4b0eb0825
                       c81992df5def632d86201d115406fd8375f96532
                       8f9627cd7697d262c9749b39baaef1cd1e93a9f4
                       4a5944424c4fbdb097c40caf9d387f5580f7243f
                       5f44f7005337f29677e5eeb902b1cef85b5b1e11
                       c84af62f7b28c3024c001d402d1e71fbbb9c253e
                       c72e6c118c49b74b43722314138c8626adf54ee7
                       d8c50f494f02caa117bc1761de863c67599db649
                       de81ecc1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:ef:70:b6:d6:b7:33:f3:d7:8e:b8:6a:e8:e6:1d:9c:b4:3e:65:cc]
            modulus: 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
    public exponent: 10001

] 
2021-08-15 08:45:47.473  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-15 08:45:47.479 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-15 08:45:47.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-15 08:45:47.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-15 08:45:47.485  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-15 08:45:47.486  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-15 08:45:47.486  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-15 08:45:47.487  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-15 08:45:47.487  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-15 08:45:47.493  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-15 08:45:47.494  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:45:47.495  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:45:47.496  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-15 08:45:47.653  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-15 08:45:47.654  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-15 08:45:47.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-15 08:45:47.660 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-15 08:45:47.661  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1087
2021-08-15 08:45:47.662  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-15 08:45:47.663  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-15 08:45:47.663  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-15 08:45:47.664  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-15 08:45:47.664  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-15 08:45:47.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:45:47.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:45:47.666 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:45:47.666 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:45:47.667 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:45:47.667 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:45:47.668 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-15 08:45:47.674 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 35887497365194410167136715202271001149483830043
             IssuerDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 15 06:28:43 UTC 2021
           Final Date: Fri Aug 15 06:28:42 UTC 2031
            SubjectDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [66:c5:83:e4:af:d1:f4:f6:ec:e0:89:eb:28:96:7c:f5:91:2b:7d:fe]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a100a2c732c5fb98c4224effb39c53cf5526d28
                       7f760e613f6a86af45f97f00758922053a6331ba
                       816a4217a4c595fe7b51e4644d1645df690c8d1b
                       5c41ddc93d0358c97e06e4661e7e3391bd06072a
                       57436e41c666725e19988e8f2ea2349e4647a8ef
                       baddfbf5f6c3e91ac13c758ce35f37ee062b4b39
                       1dbe9c977a76946c646bf3684c2b53c3a4af2908
                       b42f33f2fd4f29f4bd6cc56ebb15f91835097c13
                       80bf21e4a6d419afdba3630a61c5fe6d1eaf96eb
                       8853b936a181de2391fa6c0cd286810b8be55260
                       c9f61a71dbb9d79f04614509de1773753a5b29a6
                       5a7e0c872175464de6a0dca0d1cc90d4b0eb0825
                       c81992df5def632d86201d115406fd8375f96532
                       8f9627cd7697d262c9749b39baaef1cd1e93a9f4
                       4a5944424c4fbdb097c40caf9d387f5580f7243f
                       5f44f7005337f29677e5eeb902b1cef85b5b1e11
                       c84af62f7b28c3024c001d402d1e71fbbb9c253e
                       c72e6c118c49b74b43722314138c8626adf54ee7
                       d8c50f494f02caa117bc1761de863c67599db649
                       de81ecc1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:f2:82:7e:bd:e3:94:8e:f6:f6:72:d4:be:5a:b4:e3:99:09:ce:25]
            modulus: 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
    public exponent: 10001

] 
2021-08-15 08:46:21.102  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-15 08:46:21.104 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-15 08:46:21.106 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-08-15 08:46:21.107 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-15 08:46:21.108  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-08-15 08:46:21.109  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-15 08:46:21.109  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-15 08:46:21.110  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-15 08:46:21.110  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-15 08:46:21.116  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-15 08:46:21.117  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:46:21.118  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:46:21.120  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-15 08:46:21.240  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-15 08:46:21.241  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-15 08:46:21.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-15 08:46:21.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-15 08:46:21.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1087
2021-08-15 08:46:21.246  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-15 08:46:21.247  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-15 08:46:21.248  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-15 08:46:21.248  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-15 08:46:21.249  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-15 08:46:21.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:46:21.250 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:46:21.250 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:46:21.251 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:46:21.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:46:21.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:46:21.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-15 08:46:21.257 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 35887497365194410167136715202271001149483830043
             IssuerDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 15 06:28:43 UTC 2021
           Final Date: Fri Aug 15 06:28:42 UTC 2031
            SubjectDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [66:c5:83:e4:af:d1:f4:f6:ec:e0:89:eb:28:96:7c:f5:91:2b:7d:fe]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a100a2c732c5fb98c4224effb39c53cf5526d28
                       7f760e613f6a86af45f97f00758922053a6331ba
                       816a4217a4c595fe7b51e4644d1645df690c8d1b
                       5c41ddc93d0358c97e06e4661e7e3391bd06072a
                       57436e41c666725e19988e8f2ea2349e4647a8ef
                       baddfbf5f6c3e91ac13c758ce35f37ee062b4b39
                       1dbe9c977a76946c646bf3684c2b53c3a4af2908
                       b42f33f2fd4f29f4bd6cc56ebb15f91835097c13
                       80bf21e4a6d419afdba3630a61c5fe6d1eaf96eb
                       8853b936a181de2391fa6c0cd286810b8be55260
                       c9f61a71dbb9d79f04614509de1773753a5b29a6
                       5a7e0c872175464de6a0dca0d1cc90d4b0eb0825
                       c81992df5def632d86201d115406fd8375f96532
                       8f9627cd7697d262c9749b39baaef1cd1e93a9f4
                       4a5944424c4fbdb097c40caf9d387f5580f7243f
                       5f44f7005337f29677e5eeb902b1cef85b5b1e11
                       c84af62f7b28c3024c001d402d1e71fbbb9c253e
                       c72e6c118c49b74b43722314138c8626adf54ee7
                       d8c50f494f02caa117bc1761de863c67599db649
                       de81ecc1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:5a:c8:57:de:52:53:85:51:d1:c8:83:44:b6:d7:a4:21:01:60:27]
            modulus: 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
    public exponent: 10001

] 
2021-08-15 08:46:57.979  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-15 08:46:57.981 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-15 08:46:57.984 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-08-15 08:46:57.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-15 08:46:57.985  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-08-15 08:46:57.987  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-15 08:46:57.988  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-15 08:46:57.988  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-15 08:46:57.989  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-15 08:46:57.994  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-15 08:46:57.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:46:57.996  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:46:57.997  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-15 08:46:58.118  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-15 08:46:58.119  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-15 08:46:58.119 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-15 08:46:58.121 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-15 08:46:58.121  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1087
2021-08-15 08:46:58.122  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-15 08:46:58.123  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-15 08:46:58.123  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-15 08:46:58.124  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-15 08:46:58.124  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-15 08:46:58.124 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:46:58.125 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:46:58.125 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:46:58.126 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:46:58.126 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:46:58.126 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:46:58.127 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-15 08:46:58.132 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 35887497365194410167136715202271001149483830043
             IssuerDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 15 06:28:43 UTC 2021
           Final Date: Fri Aug 15 06:28:42 UTC 2031
            SubjectDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [66:c5:83:e4:af:d1:f4:f6:ec:e0:89:eb:28:96:7c:f5:91:2b:7d:fe]
            modulus: dd3d0f7fa260ee1ba70d6292269902f3b73f75aa48bd44c1d9b0b60d5a3c51457bd42f22eea3dda945ccc89356c5a8f076993f257fedd0ad5bea03efd920bca7c0869117cc4ebdcf7fe108d613152eb36134670652e64af651852dba5cc643d91647da9037a746159ce1af2fd778239ad083e4ea55799a317ae37ee6bdb855daa1c349e71b8bb41732f7f402915db89de6f18007765e621670cf241210d6cb4c7fb5f450ff52e6eda1d93558bcdc2af42a4ccf74a96a165d5d5ec7a7ae7e100c7fe1e0a32b45936f196c10822fe703c7e80f6d0a2b18565fc72613799273f9fb809610525662803035f88aaf119d6d578310cf32d63cba58c0ed4aefe5d056e39d2edd0df9615df3fa8d9c62813c8aa8669e346157b3445d45f0f496686cef849f4e03f08d33c5538effe2af20c7a1d57042ce89ea94450d21b6f6b46678480c8aebb59ae7ffc5947b951f7005fbf91a32f6483229db416c5eb229783b4da3cb1be8b34de72f929a061ea494f5c0ae37aaaee526b3950d2c60bb3c508e20670d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a100a2c732c5fb98c4224effb39c53cf5526d28
                       7f760e613f6a86af45f97f00758922053a6331ba
                       816a4217a4c595fe7b51e4644d1645df690c8d1b
                       5c41ddc93d0358c97e06e4661e7e3391bd06072a
                       57436e41c666725e19988e8f2ea2349e4647a8ef
                       baddfbf5f6c3e91ac13c758ce35f37ee062b4b39
                       1dbe9c977a76946c646bf3684c2b53c3a4af2908
                       b42f33f2fd4f29f4bd6cc56ebb15f91835097c13
                       80bf21e4a6d419afdba3630a61c5fe6d1eaf96eb
                       8853b936a181de2391fa6c0cd286810b8be55260
                       c9f61a71dbb9d79f04614509de1773753a5b29a6
                       5a7e0c872175464de6a0dca0d1cc90d4b0eb0825
                       c81992df5def632d86201d115406fd8375f96532
                       8f9627cd7697d262c9749b39baaef1cd1e93a9f4
                       4a5944424c4fbdb097c40caf9d387f5580f7243f
                       5f44f7005337f29677e5eeb902b1cef85b5b1e11
                       c84af62f7b28c3024c001d402d1e71fbbb9c253e
                       c72e6c118c49b74b43722314138c8626adf54ee7
                       d8c50f494f02caa117bc1761de863c67599db649
                       de81ecc1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:fe:51:97:e9:72:f7:95:86:85:0d:ed:fb:19:88:f5:38:f4:c9:fa]
            modulus: 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
    public exponent: 10001

] 
2021-08-15 08:47:09.430  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-15 08:47:09.431 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-15 08:47:09.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-15 08:47:09.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-15 08:47:09.433  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-15 08:47:09.433  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-15 08:47:09.434  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-15 08:47:09.434  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-15 08:47:09.434  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-15 08:47:09.439  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-15 08:47:09.440  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:47:09.440  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:47:09.441  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-15 08:47:09.516  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-15 08:47:09.517  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-15 08:47:09.517 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-15 08:47:09.519 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-15 08:47:09.519  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1087
2021-08-15 08:47:09.520  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-15 08:47:09.522  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-15 08:47:09.522  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-15 08:47:09.523  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-15 08:47:09.523  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-15 08:47:09.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:47:09.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:47:09.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:47:09.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:47:09.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:47:09.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:47:09.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-15 08:47:09.532 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 35887497365194410167136715202271001149483830043
             IssuerDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 15 06:28:43 UTC 2021
           Final Date: Fri Aug 15 06:28:42 UTC 2031
            SubjectDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [66:c5:83:e4:af:d1:f4:f6:ec:e0:89:eb:28:96:7c:f5:91:2b:7d:fe]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a100a2c732c5fb98c4224effb39c53cf5526d28
                       7f760e613f6a86af45f97f00758922053a6331ba
                       816a4217a4c595fe7b51e4644d1645df690c8d1b
                       5c41ddc93d0358c97e06e4661e7e3391bd06072a
                       57436e41c666725e19988e8f2ea2349e4647a8ef
                       baddfbf5f6c3e91ac13c758ce35f37ee062b4b39
                       1dbe9c977a76946c646bf3684c2b53c3a4af2908
                       b42f33f2fd4f29f4bd6cc56ebb15f91835097c13
                       80bf21e4a6d419afdba3630a61c5fe6d1eaf96eb
                       8853b936a181de2391fa6c0cd286810b8be55260
                       c9f61a71dbb9d79f04614509de1773753a5b29a6
                       5a7e0c872175464de6a0dca0d1cc90d4b0eb0825
                       c81992df5def632d86201d115406fd8375f96532
                       8f9627cd7697d262c9749b39baaef1cd1e93a9f4
                       4a5944424c4fbdb097c40caf9d387f5580f7243f
                       5f44f7005337f29677e5eeb902b1cef85b5b1e11
                       c84af62f7b28c3024c001d402d1e71fbbb9c253e
                       c72e6c118c49b74b43722314138c8626adf54ee7
                       d8c50f494f02caa117bc1761de863c67599db649
                       de81ecc1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:34:d5:a2:d1:1e:ee:2c:c5:7f:8f:3b:c5:a4:67:d1:2a:fe:b7:ae]
            modulus: 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
    public exponent: 10001

] 
2021-08-15 08:49:26.754  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-15 08:49:26.759 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-15 08:49:26.761 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-15 08:49:26.763 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-15 08:49:26.763  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-15 08:49:26.764  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-15 08:49:26.765  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-15 08:49:26.765  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-15 08:49:26.766  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-15 08:49:26.772  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-15 08:49:26.773  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:49:26.774  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-15 08:49:26.775  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-15 08:49:26.906  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-15 08:49:26.907  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-15 08:49:26.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-15 08:49:26.908 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-15 08:49:26.909  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1087
2021-08-15 08:49:26.909  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-15 08:49:26.910  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-15 08:49:26.911  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-15 08:49:26.911  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-15 08:49:26.912  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-15 08:49:26.912 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:49:26.912 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:49:26.913 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:49:26.913 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-15 08:49:26.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-15 08:49:26.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-15 08:49:26.915 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-15 08:49:26.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 35887497365194410167136715202271001149483830043
             IssuerDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Aug 15 06:28:43 UTC 2021
           Final Date: Fri Aug 15 06:28:42 UTC 2031
            SubjectDN: UID=c-0jey2nwpvs833qp2w,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [66:c5:83:e4:af:d1:f4:f6:ec:e0:89:eb:28:96:7c:f5:91:2b:7d:fe]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 3a100a2c732c5fb98c4224effb39c53cf5526d28
                       7f760e613f6a86af45f97f00758922053a6331ba
                       816a4217a4c595fe7b51e4644d1645df690c8d1b
                       5c41ddc93d0358c97e06e4661e7e3391bd06072a
                       57436e41c666725e19988e8f2ea2349e4647a8ef
                       baddfbf5f6c3e91ac13c758ce35f37ee062b4b39
                       1dbe9c977a76946c646bf3684c2b53c3a4af2908
                       b42f33f2fd4f29f4bd6cc56ebb15f91835097c13
                       80bf21e4a6d419afdba3630a61c5fe6d1eaf96eb
                       8853b936a181de2391fa6c0cd286810b8be55260
                       c9f61a71dbb9d79f04614509de1773753a5b29a6
                       5a7e0c872175464de6a0dca0d1cc90d4b0eb0825
                       c81992df5def632d86201d115406fd8375f96532
                       8f9627cd7697d262c9749b39baaef1cd1e93a9f4
                       4a5944424c4fbdb097c40caf9d387f5580f7243f
                       5f44f7005337f29677e5eeb902b1cef85b5b1e11
                       c84af62f7b28c3024c001d402d1e71fbbb9c253e
                       c72e6c118c49b74b43722314138c8626adf54ee7
                       d8c50f494f02caa117bc1761de863c67599db649
                       de81ecc1
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b4:09:eb:93:9a:d2:32:9e:71:90:49:19:30:87:05:25:17:bf:c3:f1]
            modulus: b2be621d5e992f6fe15427b6c0f02ac3b572aa2f4c3ef2efc99b92ee378f0cc4cbb8d06ad30ab9ec359b769adc0201e8f69ffa97ecc093097d6141d353990e1d0cfa3d26fcf7e3ef62cd84767338e0a4934f43fb9aff18e4cec576b624066529f9a89f32c807a388f1d42a98f0c6ff68488a6e42cd06889d7835e381d1aa480a80024c24c6a9681ec1c139a056a7d04877ff02de205956f15ac9968983577f94db31c99cf29c9462e81863bda4a14939a89b9319a49b739343d116e9af7643773485307021f17c3ebd35c4599bb5fbf8ee5c5aea4ec98f450887368776114f106385ffddc8bc8f18f146d07e7557c843fa731a561d0cbca112c053244ac20451
    public exponent: 10001

]