Results

By type

          2021-08-19 13:25:26,432 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-08-19 13:25:27,299 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-08-19 13:25:28.070  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-08-19 13:25:30.955 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-08-19 13:25:31.229  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-08-19 13:25:31.392  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-08-19 13:25:33.947  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.169 seconds (JVM running for 9.996)
2021-08-19 13:27:26.123  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 13:27:26.136 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 13:27:26.201 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-08-19 13:27:26.208 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 13:27:26.230  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-08-19 13:27:26.237  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 13:27:26.244  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 13:27:26.245  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 13:27:26.245  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 13:27:26.266  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 13:27:26.272  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 13:27:26.316  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 13:27:26.330  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 13:27:26.331  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 13:27:26.355  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 13:27:26.939  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 13:27:26.944  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 13:27:26.945 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 13:27:26.952 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 13:27:26.953  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 13:27:26.954  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 13:27:26.956  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 13:27:26.957  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 13:27:26.965  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 13:27:26.967  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 13:27:26.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 13:27:26.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 13:27:26.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 13:27:26.987 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 13:27:26.988 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 13:27:26.989 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 13:27:26.999 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 13:27:27.035 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:d4:94:ea:17:17:4d:d8:18:54:7c:2a:7b:db:19:42:3c:6e:2f:f6]
            modulus: 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
    public exponent: 10001

] 
2021-08-19 16:13:12.826  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:13:12.829 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:13:12.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-19 16:13:12.838 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:13:12.839  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-19 16:13:12.841  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:13:12.842  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:13:12.843  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:13:12.845  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:13:12.854  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:13:12.855  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:13:12.856  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:13:12.859  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:13:13.125  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:13:13.126  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:13:13.127 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:13:13.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:13:13.149  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:13:13.150  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:13:13.156  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:13:13.158  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:13:13.159  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:13:13.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:13:13.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:13:13.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:13:13.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:13:13.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:13:13.175 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:13:13.176 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:13:13.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:13:13.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:ec:23:63:f9:56:38:95:a2:dc:5b:e4:1f:6a:47:4a:c2:70:de:bf]
            modulus: ec359476cd7ae122f238bc06d948c44781d6c0e9775d1b2129e0b005ae250f8285bad0176b26466e8c7426e7e1e9cdd5d4c7b79103f33954d580a30e20f2eacb0ccdac1d5d63fb10a439898b2a734f84e3a3d939f96c72df37754bb1a37b66a837b6d1bb837ecfe4264430d03c214b3b39c6971df62bc3e9ffc5bedd8a1793aa5fc55c087b308f5ab8d9aca95edd342387f1160d6bc3dd0a3f5f12e96b095b453280bedae33ddbc3db616c9ba6ae2ae2b1bb0150e7ed30b62a959723f0e195e726b9a0df381875768bc2a0a4fa1a1dd1197efd4b3f89e4bfe9eb17e5335355fe7184fd3e803605615c6b54a79330827ef8567086a7551e54adbec40ea07719bd
    public exponent: 10001

] 
2021-08-19 16:15:07.293  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:15:07.296 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:15:07.299 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-19 16:15:07.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:15:07.301  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-19 16:15:07.302  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:15:07.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:15:07.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:15:07.304  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:15:07.312  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:15:07.313  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:15:07.313  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:15:07.315  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:15:07.448  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:15:07.449  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:15:07.449 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:15:07.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:15:07.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:15:07.453  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:15:07.454  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:15:07.455  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:15:07.455  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:15:07.456  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:15:07.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:15:07.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:15:07.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:15:07.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:15:07.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:15:07.460 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:15:07.461 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:15:07.465 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:d5:6f:5f:db:c4:01:e9:ee:49:a7:53:7c:de:ed:2a:97:f7:0d:ab]
            modulus: d323d9b016362e740cb551caed155e505e4a3667fb60916fa9e1cd2ceb2d7c290d43b79617361e9c59469603a21958f51093b0c510f17eb36a48fbf10c1b2570371cf31f6e49f36d1f247096ef91597e63743f75a0bcb3fa6e86203870f61c11fd38d8137034ae7048f624fc98d34d79c2dc0c6c8d1d4d9079bb2481eadee9c1a1a65a65faa4089415013c05f4a565a628a2dbdefd5d20e41f73c883982d6b7f0fbbbebf4796cddc742a0a4a9cd8407d35523ca2d812a01b7c260b1d0264855afd065c74c6d21e5b8498cdcf1081ac60f4099250b6bf76cf4371128556e7da37edbec22699c207cb5c46f3b74bd0ca18764e127e9d0bdb25067201b0336921d5
    public exponent: 10001

] 
2021-08-19 16:18:42.857  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:18:42.871 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:18:42.875 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-19 16:18:42.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:18:42.878  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-19 16:18:42.879  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:18:42.879  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:18:42.880  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:18:42.880  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:18:42.888  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:18:42.889  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:18:42.890  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:18:42.891  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:18:43.110  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:18:43.111  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:18:43.111 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:18:43.114 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:18:43.115  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:18:43.115  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:18:43.116  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:18:43.117  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:18:43.118  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:18:43.118  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:18:43.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:18:43.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:18:43.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:18:43.121 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:18:43.121 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:18:43.121 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:18:43.122 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:18:43.126 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: a15ac8e3cd0935b43ae8f762e2ae0fc7d3aa21cc26598aa8fa0e0cfe0d11c329a3f699655e5a1f7fc01e1f7a7b86feeb9f6198b53308b1b8c047e678e68e94762a3cb0678855793dc0e413bc896dcaf03d4c13c722f8f2295330819d8547c084362bb6e4d4f089e8f66ae3ec6f2699a30bbc58c52cebe0a01df99d37cdfac5c2d0356be55303df71e9cf8aa9be252373e27391e3445943981241ba8b7accb5a9bf0d95d5716c4ba610ce1b5d49011ff41acd1a281506be5748d8a0e3151b065dd4554db7afe55310c51abf837c73792db6d9d80dbfcfb9654c950c8c4fb69d0d6231a097ef8b9333fdd84096b48a135fa2d66fe25291957f53e50a09f7dc75398e59e932d0d2e34f1f6d3c5a0f153547a89193fd08d82f4f2a8886334566a1e9b6912d620aec5dbdf7c72d60b6c4e63e11f7a501ab1c95663690b5e0e236fe85310f50181354d49c17e478de274aa5c287ebe66186c9424cabe996b4c241b55dc35b287629782cc1e06e15740ae3ebd2ea0be63fcf18749d5de4d67c6844c79f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:96:b1:68:3b:c1:da:ce:5d:90:27:28:35:6d:ed:fa:31:2c:02:61]
            modulus: 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
    public exponent: 10001

] 
2021-08-19 16:18:58.958  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:18:58.959 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:18:58.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-19 16:18:58.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:18:58.962  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-19 16:18:58.962  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:18:58.963  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:18:58.963  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:18:58.964  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:18:58.971  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:18:58.974  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:18:58.974  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:18:58.978  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:18:59.097  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:18:59.098  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:18:59.098 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:18:59.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:18:59.100  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:18:59.101  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:18:59.102  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:18:59.102  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:18:59.102  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:18:59.103  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:18:59.103 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:18:59.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:18:59.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:18:59.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:18:59.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:18:59.105 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:18:59.106 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:18:59.109 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:f9:93:ce:9a:45:8e:60:98:6d:f4:f5:9d:f6:77:40:cf:8f:63:13]
            modulus: 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
    public exponent: 10001

] 
2021-08-19 16:19:12.743  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:19:12.744 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:19:12.745 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-08-19 16:19:12.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:19:12.748  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-08-19 16:19:12.754  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:19:12.754  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:19:12.755  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:19:12.756  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:19:12.763  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:19:12.764  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:19:12.764  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:19:12.766  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:19:13.008  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:19:13.009  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:19:13.009 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:19:13.011 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:19:13.012  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:19:13.014  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:19:13.015  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:19:13.015  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:19:13.015  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:19:13.016  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:19:13.016 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:19:13.017 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:19:13.017 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:19:13.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:19:13.018 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:19:13.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:19:13.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:19:13.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [53:58:ac:c3:3a:cf:78:2a:e2:e4:c5:d5:33:29:b9:d5:4e:9a:32:b8]
            modulus: e130c47be78d5ed7cd56a4c65b5ff9ef907a1df483ae62fd74584bc49793b16145500b856f1f9932a143a52dcb6ff92f4cbf079b8b0d087848cc0b0f8917f6d913d0ea0721bd7bd3c9340164b8cf8602599329ab75140133e28bc677abfe4b4a9a3f411d4a85569c94438be6672147799253e738491f57d914c5ed77544d1863ac6c28f9325100a3c9f4f7a21fe17911a46bfe56a6b6d2f473b6cfebca5d08078658754d1ce89ff2a947719412f60613789ca8e5b531b1b245e9cb1a129d48c96754b51633da28da5d0ebf88b42c99f806474c3b191405fdd6145e76c69b00298e6d18fa4706ce710d6308a3a463f95669347ad48f7b61bbd90b40724bec0061
    public exponent: 10001

] 
2021-08-19 16:19:48.257  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:19:48.259 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:19:48.261 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-08-19 16:19:48.262 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:19:48.263  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-08-19 16:19:48.264  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:19:48.264  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:19:48.265  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:19:48.266  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:19:48.272  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:19:48.273  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:19:48.273  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:19:48.275  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:19:48.376  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:19:48.377  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:19:48.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:19:48.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:19:48.380  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:19:48.381  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:19:48.382  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:19:48.382  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:19:48.383  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:19:48.383  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:19:48.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:19:48.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:19:48.385 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:19:48.385 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:19:48.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:19:48.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:19:48.387 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:19:48.392 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:4f:e6:bd:aa:cc:af:5c:ce:dd:30:65:1e:ef:fd:77:71:97:64:b9]
            modulus: b9f70c52bf643026f41159366c49bfe460db75c7c21bdb2a50872d0ec1ff95922a984af28cca475291ebfbe27e819eed838da4e751e0014f54d200c14d4339027ba872245c59d9c34b8a3718243bb1a1c240bdbfdccf57b80f054a95bcb9b32fe9278ec5669d7544ba67d87745ea9505f1f50acee9cc16c8608be8ab52c0b7c8ab962e5b8d1038a6b83109c06565271c20483b8e00c54d19670f3fdc7ae313e16ad1222e5fd5655aa21d332a2b2968ca62c1482f12e6a5ef4044d39b04f80b071fd81abcb46f2a5c57907d8bacfaef8b0f46f944ceb94ecdd39264303070c01675e40a1fd62cb59b8a0e51c61769df6ca052c4a3f3f0f6c613701f6c576a0fe7
    public exponent: 10001

] 
2021-08-19 16:21:34.883  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:21:34.886 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:21:34.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-19 16:21:34.892 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:21:34.892  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-19 16:21:34.894  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:21:34.895  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:21:34.895  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:21:34.897  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:21:34.908  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:21:34.909  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:21:34.909  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:21:34.910  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:21:35.064  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:21:35.065  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:21:35.066 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:21:35.067 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:21:35.068  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:21:35.068  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:21:35.070  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:21:35.071  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:21:35.072  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:21:35.072  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:21:35.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:21:35.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:21:35.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:21:35.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:21:35.075 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:21:35.075 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:21:35.076 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:21:35.081 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0e:cb:bd:c8:f1:01:ad:3f:80:41:86:ac:50:c7:ef:9b:47:53:d0:40]
            modulus: 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
    public exponent: 10001

] 
2021-08-19 16:22:55.679  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:22:55.683 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:22:55.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-19 16:22:55.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:22:55.690  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-19 16:22:55.691  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:22:55.691  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:22:55.692  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:22:55.693  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:22:55.698  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:22:55.699  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:22:55.699  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:22:55.700  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:22:55.862  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:22:55.864  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:22:55.864 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:22:55.865 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:22:55.866  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:22:55.866  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:22:55.868  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:22:55.868  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:22:55.869  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:22:55.870  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:22:55.870 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:22:55.871 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:22:55.871 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:22:55.872 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:22:55.873 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:22:55.873 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:22:55.874 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:22:55.879 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:4b:5d:4f:24:63:a2:ef:d7:87:64:b5:4e:9a:a2:62:14:0c:34:e9]
            modulus: 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
    public exponent: 10001

] 
2021-08-19 16:29:24.177  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:29:24.180 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:29:24.182 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-19 16:29:24.183 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:29:24.183  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-19 16:29:24.184  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:29:24.185  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:29:24.188  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:29:24.188  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:29:24.194  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:29:24.195  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:29:24.196  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:29:24.197  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:29:24.347  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:29:24.348  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:29:24.348 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:29:24.350 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:29:24.351  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:29:24.351  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:29:24.352  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:29:24.353  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:29:24.353  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:29:24.354  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:29:24.354 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:29:24.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:29:24.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:29:24.357 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:29:24.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:29:24.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:29:24.359 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:29:24.363 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: a15ac8e3cd0935b43ae8f762e2ae0fc7d3aa21cc26598aa8fa0e0cfe0d11c329a3f699655e5a1f7fc01e1f7a7b86feeb9f6198b53308b1b8c047e678e68e94762a3cb0678855793dc0e413bc896dcaf03d4c13c722f8f2295330819d8547c084362bb6e4d4f089e8f66ae3ec6f2699a30bbc58c52cebe0a01df99d37cdfac5c2d0356be55303df71e9cf8aa9be252373e27391e3445943981241ba8b7accb5a9bf0d95d5716c4ba610ce1b5d49011ff41acd1a281506be5748d8a0e3151b065dd4554db7afe55310c51abf837c73792db6d9d80dbfcfb9654c950c8c4fb69d0d6231a097ef8b9333fdd84096b48a135fa2d66fe25291957f53e50a09f7dc75398e59e932d0d2e34f1f6d3c5a0f153547a89193fd08d82f4f2a8886334566a1e9b6912d620aec5dbdf7c72d60b6c4e63e11f7a501ab1c95663690b5e0e236fe85310f50181354d49c17e478de274aa5c287ebe66186c9424cabe996b4c241b55dc35b287629782cc1e06e15740ae3ebd2ea0be63fcf18749d5de4d67c6844c79f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:c1:d1:ed:c1:f6:5e:9c:db:52:f8:17:ce:83:a8:e5:cd:44:22:81]
            modulus: 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
    public exponent: 10001

] 
2021-08-19 16:30:38.029  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:30:38.030 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:30:38.032 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-19 16:30:38.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:30:38.033  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-19 16:30:38.034  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:30:38.037  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:30:38.038  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:30:38.039  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:30:38.043  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:30:38.044  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:30:38.044  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:30:38.045  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:30:38.172  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:30:38.173  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:30:38.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:30:38.175 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:30:38.175  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:30:38.175  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:30:38.177  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:30:38.177  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:30:38.177  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:30:38.178  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:30:38.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:30:38.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:30:38.179 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:30:38.180 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:30:38.180 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:30:38.180 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:30:38.181 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:30:38.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8e:22:1f:44:07:46:6a:f5:50:70:53:b7:8c:7b:8a:33:e8:a5:ec:1d]
            modulus: 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
    public exponent: 10001

] 
2021-08-19 16:35:39.638  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:35:39.642 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:35:39.644 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-19 16:35:39.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:35:39.647  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-08-19 16:35:39.647  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:35:39.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:35:39.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:35:39.649  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:35:39.654  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:35:39.655  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:35:39.656  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:35:39.657  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:35:39.811  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:35:39.812  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:35:39.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:35:39.814 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:35:39.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:35:39.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:35:39.817  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:35:39.817  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:35:39.818  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:35:39.818  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:35:39.818 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:35:39.819 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:35:39.819 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:35:39.820 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:35:39.820 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:35:39.821 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:35:39.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:35:39.826 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b5:72:33:27:a0:4c:0f:34:64:fe:f9:4b:d2:21:76:ad:16:67:d1:da]
            modulus: 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
    public exponent: 10001

] 
2021-08-19 16:37:14.437  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:37:14.438 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:37:14.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-19 16:37:14.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:37:14.441  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-19 16:37:14.441  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:37:14.442  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:37:14.442  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:37:14.443  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:37:14.448  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:37:14.449  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:37:14.450  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:37:14.450  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:37:14.606  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:37:14.607  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:37:14.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:37:14.609 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:37:14.609  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:37:14.610  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:37:14.610  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:37:14.611  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:37:14.611  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:37:14.612  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:37:14.612 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:37:14.612 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:37:14.613 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:37:14.613 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:37:14.614 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:37:14.614 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:37:14.615 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:37:14.618 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:ce:7b:89:fa:ac:70:3b:4d:6c:c3:15:78:71:3d:58:5d:62:39:ef]
            modulus: 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
    public exponent: 10001

] 
2021-08-19 16:38:44.581  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-19 16:38:44.584 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-19 16:38:44.587 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-19 16:38:44.588 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-19 16:38:44.589  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-19 16:38:44.591  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-19 16:38:44.591  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-19 16:38:44.592  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-19 16:38:44.593  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-19 16:38:44.600  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-19 16:38:44.601  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:38:44.601  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-19 16:38:44.602  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-19 16:38:44.732  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-19 16:38:44.733  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-19 16:38:44.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-19 16:38:44.735 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-19 16:38:44.735  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1004
2021-08-19 16:38:44.736  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-19 16:38:44.737  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-19 16:38:44.737  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-19 16:38:44.738  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-19 16:38:44.738  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-19 16:38:44.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:38:44.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:38:44.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:38:44.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-19 16:38:44.740 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-19 16:38:44.741 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-19 16:38:44.742 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-19 16:38:44.746 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 298858864136821541455361369426658112736230947679
             IssuerDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 19 13:20:47 UTC 2021
           Final Date: Tue Aug 19 13:20:46 UTC 2031
            SubjectDN: UID=c-0jn4937xa2gmodcnd,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f5:ac:82:9a:1b:44:46:9f:dd:fd:ea:a8:2a:4b:bc:2b:1d:b4:e2:ef]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2cf2285d4965f3c455cae4cd42620fd4465efad3
                       93302d22ab57285bf7615be930b46904e96ce844
                       99bdefe1a3f0beebc23ae4f5f91e040935f7bb66
                       1264c0ca71e10faf175f361643485dcac8ba40de
                       ded5b74f56bb17eb0af82a283b3907be66c40431
                       ff44fe67577f2346d288527858dcd050a839566c
                       4656fecc2da7d28d6d5c80639185e31f397ae936
                       127e4f9888c9339cc8ef35c66ae0ad7bd1f35ab1
                       d2d86a952b76154bc7f01ca1ed55caf739fc7d1e
                       0ef5de83f268eb4d96d116106b5bb90c0b84d513
                       a16740d77c2a2d14371dd2a71c56e658104782c0
                       284db7df62c9610d5d740a794ad43f2213983342
                       08085128cf43eb072abd3c5806cf9b6372821212
                       5ad39dd0765c5460d4cd4efa301e5b42e970f942
                       27f803498890072c3b778516fc66baaf9e49a7e0
                       6a7e983a9639a38b7df5577f9d6fa7322971d1cb
                       86dcdff49fb9644fe5eff64970695c0533adfae4
                       5e959cf3da63c38e68c81ab2796fa4c9b3783928
                       7f1fff7f09ea03d673ce13c5fcab6997580700de
                       4f306be5
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:59:8a:7d:18:1a:18:89:0a:3f:8a:5f:36:8b:0b:40:25:04:36:74]
            modulus: d105c8be1c05197348b0b357c9e77634e53b00c6ee7fb86241ca1f16aec957298f206331843e0b4057b754678238f1e2a55caf476670475307bbf7c82e31b466b83c712fd4591c0c54def76286d6ee382417d24ef91c3aa7034ece98bf68b6ae47611711ce029f5982a4c6c7057acca9ffcab056b059c1691829e52e97844340b9c6360b6931c388e1e69e1ae4d7b8a5b4ffbc97a7b655572369334378a929b11c244206bd028f2ceedc003cd7229001b2ec198ea6b56ec5aaba180472242d86e2513047197cd4ca0733bb21a18d1a1e122a6ed9b5efb1cae5017110aed711e89a9bb04e52f2fd022e8254a7a6e3b3131cb831e61ac594678b29e7843a4c59f1
    public exponent: 10001

]