Results

By type

          2021-04-10 00:12:23,436 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-04-10 00:12:27,137 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-04-10 00:12:29.744  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-04-10 00:12:40.952 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-04-10 00:12:41.936  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-04-10 00:12:42.540  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-04-10 00:12:55.532  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 34.378 seconds (JVM running for 41.261)
2021-04-10 00:21:38.333  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 00:21:38.342 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 00:21:38.464 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-04-10 00:21:38.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 00:21:38.542  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-04-10 00:21:38.548  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 00:21:38.631  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 00:21:38.632  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 00:21:38.633  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 00:21:38.640  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 00:21:38.644  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 00:21:38.843  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 00:21:38.932  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 00:21:38.933  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 00:21:39.032  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 00:21:40.829  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 00:21:40.833  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 00:21:40.833 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 00:21:40.839 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 00:21:40.840  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 00:21:40.840  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 00:21:40.843  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 00:21:40.844  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 00:21:40.932  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 00:21:40.933  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 00:21:40.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 00:21:40.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 00:21:40.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 00:21:40.945 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 00:21:40.945 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 00:21:40.946 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 00:21:40.953 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 00:21:41.138 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bf:8e:67:4b:9e:84:b1:e7:1e:3e:9e:84:c6:1b:46:f3:51:b0:38:bc]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:30:24.765  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:30:24.766 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:30:24.769 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:30:24.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:30:24.770  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:30:24.771  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:30:24.771  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:30:24.772  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:30:24.772  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:30:24.829  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:30:24.830  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:30:24.830  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:30:24.833  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:30:25.014  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:30:25.015  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:30:25.015 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:30:25.019 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:30:25.020  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:30:25.021  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:30:25.023  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:30:25.024  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:30:25.024  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:30:25.025  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:30:25.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:30:25.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:30:25.026 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:30:25.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:30:25.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:30:25.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:30:25.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:30:25.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:40:0d:b9:b0:0f:35:b2:c1:20:c2:31:fb:46:3d:df:fb:81:93:9e]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:32:17.216  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:32:17.218 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:32:17.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-10 01:32:17.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:32:17.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-10 01:32:17.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:32:17.222  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:32:17.222  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:32:17.223  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:32:17.239  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:32:17.240  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:32:17.240  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:32:17.242  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:32:17.370  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:32:17.371  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:32:17.429 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:32:17.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:32:17.433  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:32:17.433  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:32:17.436  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:32:17.437  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:32:17.437  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:32:17.438  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:32:17.438 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:32:17.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:32:17.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:32:17.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:32:17.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:32:17.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:32:17.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:32:17.445 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 9257dc7a068bb36f20c79322149a14c5209f713019a2bc3c69b98c5141d677a44d5063572c231f40ab9470eaaf3f3bc5242e4b1046b632b8fb146c966ccb2576453c708b1e9b4be99f69b084fe00d4608afad3a88e025c0a9c72c0ae399082f49693bc85e968131fab903e0e1a61e2d98925b88ec94fcae9780a86f9c449f32a236ad0e014c9f08683dfb03f6675f0ee8092cb25b1dc0dfb1cf4b05d6752622278814acd6f98d3c89f526bd7ac69654960764ba8e4f9cac864586fe3e111f6b465a9476a9b6a48f4bf147ad41983a53733825eb2daa276a8862a630ed28c1eb113f2023131571a6438d1e59ff257ad38f8e9a089ea4d24a00154acc2144404e4cfae1652de43cd77635176730ef6586eca0e5d3beb1b6e86c1e4782a90f7397d00db7785da95496c92bdaf828ac57a364c658f5b8bd6604a1c85692e9fb4d818f0f26b3b5217c9d16cd7d1a937cdaaa07a149aec0a24edcd408e3d08e6223788b458bb77e68a0d770fe0712bca5e247080350292ec7e476d858a1bde6a116423
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:b3:9f:41:04:a7:67:c3:97:d3:c1:b3:8b:70:7d:23:9b:a0:5b:9c]
            modulus: c056c7e3a3882ed8c0afc4d8ee6e440e73b20ac64a091a01c817cb804807cd356af60821632108ef8cad16d7ce584cc14b3cfa10b61a84c4c720ee6cdd4ff9ccfb3ce6ff1eb829add8cd180032980f2edf441dcd93737498fc23c84fe9a849d6c2ceb0a70cab06a5719c2c22e12767e80ae50de7931a6815c3ed3a5dcabc8294822d0ad5311c529c351d319601323cdf315f91ed3b580d8e55c83a3d23b473cfc6fd326e6f26b3c6e490c71f8dc0e89321787c642d47c88a73ca15e5d5bfa859b9ead9ddebeaa31feba8df809d615bad01e614dbe84efefb12654b0967af2452910547d40da3c0b34f14c352da1da0506e971e8e8a041acf4592b2032cee5d4b
    public exponent: 10001

] 
2021-04-10 01:34:53.283  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:34:53.285 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:34:53.287 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-10 01:34:53.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:34:53.288  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-10 01:34:53.289  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:34:53.289  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:34:53.289  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:34:53.290  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:34:53.294  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:34:53.294  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:34:53.295  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:34:53.296  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:34:53.409  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:34:53.410  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:34:53.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:34:53.434 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:34:53.439  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:34:53.439  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:34:53.440  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:34:53.441  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:34:53.441  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:34:53.441  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:34:53.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:34:53.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:34:53.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:34:53.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:34:53.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:34:53.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:34:53.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:34:53.447 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:ed:d7:c0:24:02:8a:e4:4e:cc:27:fb:34:09:6c:fc:ff:9d:ef:90]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:35:02.447  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:35:02.449 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:35:02.450 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-10 01:35:02.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:35:02.451  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-10 01:35:02.451  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:35:02.452  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:35:02.452  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:35:02.452  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:35:02.456  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:35:02.457  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:35:02.457  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:35:02.458  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:35:02.558  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:35:02.559  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:35:02.559 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:35:02.561 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:35:02.562  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:35:02.562  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:35:02.566  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:35:02.567  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:35:02.567  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:35:02.629  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:35:02.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:35:02.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:35:02.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:35:02.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:35:02.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:35:02.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:35:02.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:35:02.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 9257dc7a068bb36f20c79322149a14c5209f713019a2bc3c69b98c5141d677a44d5063572c231f40ab9470eaaf3f3bc5242e4b1046b632b8fb146c966ccb2576453c708b1e9b4be99f69b084fe00d4608afad3a88e025c0a9c72c0ae399082f49693bc85e968131fab903e0e1a61e2d98925b88ec94fcae9780a86f9c449f32a236ad0e014c9f08683dfb03f6675f0ee8092cb25b1dc0dfb1cf4b05d6752622278814acd6f98d3c89f526bd7ac69654960764ba8e4f9cac864586fe3e111f6b465a9476a9b6a48f4bf147ad41983a53733825eb2daa276a8862a630ed28c1eb113f2023131571a6438d1e59ff257ad38f8e9a089ea4d24a00154acc2144404e4cfae1652de43cd77635176730ef6586eca0e5d3beb1b6e86c1e4782a90f7397d00db7785da95496c92bdaf828ac57a364c658f5b8bd6604a1c85692e9fb4d818f0f26b3b5217c9d16cd7d1a937cdaaa07a149aec0a24edcd408e3d08e6223788b458bb77e68a0d770fe0712bca5e247080350292ec7e476d858a1bde6a116423
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:c7:2e:52:54:34:89:20:c8:f1:79:54:a1:af:ad:fd:23:21:35:5e]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:35:34.621  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:35:34.622 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:35:34.623 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-10 01:35:34.624 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:35:34.624  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-10 01:35:34.625  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:35:34.626  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:35:34.626  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:35:34.626  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:35:34.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:35:34.631  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:35:34.631  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:35:34.632  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:35:34.803  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:35:34.804  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:35:34.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:35:34.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:35:34.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:35:34.808  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:35:34.809  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:35:34.810  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:35:34.810  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:35:34.810  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:35:34.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:35:34.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:35:34.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:35:34.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:35:34.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:35:34.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:35:34.813 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:35:34.815 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [13:6b:65:41:2d:86:b5:02:f8:28:45:0a:93:37:86:a2:93:d8:6a:f0]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:36:28.543  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:36:28.545 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:36:28.547 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-10 01:36:28.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:36:28.548  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-10 01:36:28.549  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:36:28.549  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:36:28.550  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:36:28.550  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:36:28.557  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:36:28.558  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:36:28.559  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:36:28.560  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:36:28.733  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:36:28.734  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:36:28.734 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:36:28.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:36:28.736  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:36:28.736  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:36:28.737  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:36:28.737  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:36:28.738  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:36:28.738  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:36:28.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:36:28.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:36:28.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:36:28.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:36:28.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:36:28.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:36:28.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:36:28.745 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 9257dc7a068bb36f20c79322149a14c5209f713019a2bc3c69b98c5141d677a44d5063572c231f40ab9470eaaf3f3bc5242e4b1046b632b8fb146c966ccb2576453c708b1e9b4be99f69b084fe00d4608afad3a88e025c0a9c72c0ae399082f49693bc85e968131fab903e0e1a61e2d98925b88ec94fcae9780a86f9c449f32a236ad0e014c9f08683dfb03f6675f0ee8092cb25b1dc0dfb1cf4b05d6752622278814acd6f98d3c89f526bd7ac69654960764ba8e4f9cac864586fe3e111f6b465a9476a9b6a48f4bf147ad41983a53733825eb2daa276a8862a630ed28c1eb113f2023131571a6438d1e59ff257ad38f8e9a089ea4d24a00154acc2144404e4cfae1652de43cd77635176730ef6586eca0e5d3beb1b6e86c1e4782a90f7397d00db7785da95496c92bdaf828ac57a364c658f5b8bd6604a1c85692e9fb4d818f0f26b3b5217c9d16cd7d1a937cdaaa07a149aec0a24edcd408e3d08e6223788b458bb77e68a0d770fe0712bca5e247080350292ec7e476d858a1bde6a116423
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:e2:e4:eb:36:66:08:70:4e:f4:ce:d8:30:bc:fb:55:c0:4a:1a:c2]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:37:15.421  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:37:15.422 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:37:15.423 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-10 01:37:15.424 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:37:15.424  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-10 01:37:15.425  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:37:15.425  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:37:15.425  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:37:15.425  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:37:15.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:37:15.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:37:15.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:37:15.431  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:37:15.514  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:37:15.515  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:37:15.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:37:15.532 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:37:15.534  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:37:15.535  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:37:15.537  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:37:15.539  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:37:15.539  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:37:15.540  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:37:15.540 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:37:15.540 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:37:15.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:37:15.542 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:37:15.542 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:37:15.542 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:37:15.543 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:37:15.546 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:1f:15:bf:09:fb:37:43:b5:04:ca:ce:da:dd:9c:7a:48:c8:52:c6]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:41:51.306  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:41:51.307 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:41:51.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:41:51.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:41:51.309  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:41:51.310  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:41:51.310  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:41:51.310  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:41:51.311  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:41:51.314  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:41:51.314  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:41:51.315  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:41:51.315  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:41:51.409  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:41:51.410  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:41:51.410 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:41:51.411 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:41:51.411  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:41:51.412  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:41:51.412  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:41:51.413  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:41:51.413  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:41:51.413  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:41:51.413 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:41:51.413 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:41:51.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:41:51.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:41:51.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:41:51.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:41:51.415 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:41:51.417 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:2b:6e:b6:7c:5d:84:93:c6:88:13:43:8b:f4:8b:73:bd:7f:b7:b8]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:45:58.022  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:45:58.023 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:45:58.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-10 01:45:58.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:45:58.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-10 01:45:58.025  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:45:58.025  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:45:58.025  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:45:58.026  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:45:58.029  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:45:58.029  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:45:58.029  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:45:58.030  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:45:58.124  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:45:58.125  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:45:58.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:45:58.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:45:58.130  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:45:58.130  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:45:58.132  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:45:58.133  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:45:58.133  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:45:58.134  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:45:58.134 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:45:58.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:45:58.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:45:58.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:45:58.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:45:58.136 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:45:58.136 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:45:58.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [db:f5:9d:24:5e:df:61:57:55:45:f3:69:d7:e0:b5:b2:00:87:98:52]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:46:32.498  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:46:32.499 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:46:32.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-10 01:46:32.502 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:46:32.502  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-10 01:46:32.503  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:46:32.503  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:46:32.504  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:46:32.504  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:46:32.511  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:46:32.512  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:46:32.512  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:46:32.513  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:46:32.627  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:46:32.627  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:46:32.628 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:46:32.629 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:46:32.629  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:46:32.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:46:32.634  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:46:32.635  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:46:32.636  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:46:32.636  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:46:32.636 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:46:32.637 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:46:32.637 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:46:32.638 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:46:32.638 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:46:32.638 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:46:32.639 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:46:32.643 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:96:cf:9e:4b:7c:a2:62:3f:65:ec:ed:2b:17:f1:0f:f3:ca:80:05]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:47:03.513  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:47:03.514 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:47:03.516 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-10 01:47:03.517 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:47:03.517  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-10 01:47:03.517  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:47:03.518  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:47:03.518  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:47:03.518  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:47:03.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:47:03.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:47:03.526  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:47:03.526  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:47:03.627  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:47:03.628  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:47:03.628 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:47:03.629 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:47:03.630  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:47:03.630  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:47:03.631  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:47:03.631  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:47:03.631  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:47:03.631  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:47:03.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:47:03.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:47:03.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:47:03.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:47:03.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:47:03.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:47:03.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:47:03.636 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 9257dc7a068bb36f20c79322149a14c5209f713019a2bc3c69b98c5141d677a44d5063572c231f40ab9470eaaf3f3bc5242e4b1046b632b8fb146c966ccb2576453c708b1e9b4be99f69b084fe00d4608afad3a88e025c0a9c72c0ae399082f49693bc85e968131fab903e0e1a61e2d98925b88ec94fcae9780a86f9c449f32a236ad0e014c9f08683dfb03f6675f0ee8092cb25b1dc0dfb1cf4b05d6752622278814acd6f98d3c89f526bd7ac69654960764ba8e4f9cac864586fe3e111f6b465a9476a9b6a48f4bf147ad41983a53733825eb2daa276a8862a630ed28c1eb113f2023131571a6438d1e59ff257ad38f8e9a089ea4d24a00154acc2144404e4cfae1652de43cd77635176730ef6586eca0e5d3beb1b6e86c1e4782a90f7397d00db7785da95496c92bdaf828ac57a364c658f5b8bd6604a1c85692e9fb4d818f0f26b3b5217c9d16cd7d1a937cdaaa07a149aec0a24edcd408e3d08e6223788b458bb77e68a0d770fe0712bca5e247080350292ec7e476d858a1bde6a116423
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [21:0f:00:e8:4f:8d:6b:cd:cb:b9:a1:65:70:f4:82:df:90:35:38:c9]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:49:09.334  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:49:09.335 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:49:09.336 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-10 01:49:09.337 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:49:09.337  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-10 01:49:09.338  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:49:09.338  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:49:09.338  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:49:09.338  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:49:09.343  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:49:09.344  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:49:09.344  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:49:09.345  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:49:09.416  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:49:09.417  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:49:09.417 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:49:09.418 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:49:09.419  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:49:09.419  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:49:09.420  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:49:09.421  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:49:09.421  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:49:09.421  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:49:09.421 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:49:09.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:49:09.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:49:09.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:49:09.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:49:09.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:49:09.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:49:09.429 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 9257dc7a068bb36f20c79322149a14c5209f713019a2bc3c69b98c5141d677a44d5063572c231f40ab9470eaaf3f3bc5242e4b1046b632b8fb146c966ccb2576453c708b1e9b4be99f69b084fe00d4608afad3a88e025c0a9c72c0ae399082f49693bc85e968131fab903e0e1a61e2d98925b88ec94fcae9780a86f9c449f32a236ad0e014c9f08683dfb03f6675f0ee8092cb25b1dc0dfb1cf4b05d6752622278814acd6f98d3c89f526bd7ac69654960764ba8e4f9cac864586fe3e111f6b465a9476a9b6a48f4bf147ad41983a53733825eb2daa276a8862a630ed28c1eb113f2023131571a6438d1e59ff257ad38f8e9a089ea4d24a00154acc2144404e4cfae1652de43cd77635176730ef6586eca0e5d3beb1b6e86c1e4782a90f7397d00db7785da95496c92bdaf828ac57a364c658f5b8bd6604a1c85692e9fb4d818f0f26b3b5217c9d16cd7d1a937cdaaa07a149aec0a24edcd408e3d08e6223788b458bb77e68a0d770fe0712bca5e247080350292ec7e476d858a1bde6a116423
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:30:17:4b:f0:2e:76:93:11:d8:52:af:e2:9d:d5:8e:ee:8e:5e:57]
            modulus: a030ed51d9a7c3318a1ee89ee5255c4a104679c4c0cea90de99ba68cf77f21f8eebfd066a8610841a1398cb8605e13b5cd5f924f1452904a80d3ad05a7cb66fb81e24476fd77523555ed3e6dc19bf00a531871deb80f21142747ee1d5a506fb331ea1ef9b45ef38b8dd0ed280141ff365775b745fb067dae1b58fb615e0fd2afc0bc9fee31fbc4130d1047120e1eb0bde5cd7f55319e65b3b490ff46717c2f4ca77f20e4dfc7693a064df18dcbd82b5b936a3d39ecd27a74e5459f1597010cbe5d19d0b4433a640a06193663dc08214607dc990da7075d831e8e1cca69b93851d73a0e30ae3ab04e004e1317a6971823e70ab1c94001788e157b6081358143fd
    public exponent: 10001

] 
2021-04-10 01:50:13.763  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:50:13.764 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:50:13.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:50:13.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:50:13.767  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:50:13.768  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:50:13.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:50:13.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:50:13.770  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:50:13.773  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:50:13.774  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:50:13.774  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:50:13.775  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:50:13.883  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:50:13.884  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:50:13.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:50:13.886 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:50:13.886  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:50:13.887  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:50:13.888  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:50:13.888  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:50:13.889  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:50:13.889  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:50:13.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:50:13.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:50:13.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:50:13.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:50:13.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:50:13.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:50:13.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:50:13.893 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0f:0e:cd:2f:32:a5:03:26:8d:5e:58:ae:95:f7:c3:cb:2b:c3:1b:2a]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:52:43.434  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:52:43.435 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:52:43.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:52:43.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:52:43.438  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:52:43.438  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:52:43.438  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:52:43.439  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:52:43.439  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:52:43.444  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:52:43.445  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:52:43.445  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:52:43.446  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:52:43.533  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:52:43.534  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:52:43.534 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:52:43.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:52:43.537  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:52:43.538  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:52:43.539  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:52:43.540  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:52:43.540  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:52:43.540  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:52:43.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:52:43.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:52:43.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:52:43.542 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:52:43.542 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:52:43.542 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:52:43.543 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:52:43.546 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:c4:8d:ff:e0:b1:a9:b7:33:f5:01:f0:66:47:95:d4:a9:32:f8:99]
            modulus: 80c72fa25cee20e8bd63e12d289ab3cd45b0c7e16c7715da07138a8a931657735ed2b5251b72fe566cff556e6a79e563f2c28846a1348670f3d54eb1e9ee55c7f73f71d68bccfe8b8e909d580ba95bb454f0e9d6825470edd84a514e6e19f491fcbf79e261531e4aaaaaa99e2df0f40aa0b2a052a625681d1cf936abfab472ced6e6a2e0a262baef2a7322cc9a917fd15e1ef713ee327994e6abb474f808e6c3c2fcbcbef97078ae5f990ced418974856abcd4effae8b1e81b3101c7d0a64e58aa0302ef558579dec410c56e4f9f8e8aee446ccc10d541f9479a474ee65a56bb0f3f987532eea1a286487707f20d7625ec4138b6c175b7db53d1574c2f965217
    public exponent: 10001

] 
2021-04-10 01:54:30.706  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:54:30.707 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:54:30.708 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:54:30.709 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:54:30.709  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:54:30.709  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:54:30.709  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:54:30.710  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:54:30.710  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:54:30.714  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:54:30.715  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:54:30.715  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:54:30.716  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:54:30.842  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:54:30.843  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:54:30.843 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:54:30.845 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:54:30.846  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:54:30.846  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:54:30.848  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:54:30.848  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:54:30.849  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:54:30.849  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:54:30.849 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:54:30.849 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:54:30.849 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:54:30.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:54:30.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:54:30.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:54:30.851 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:54:30.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:ab:fa:cb:95:63:a8:1c:16:c0:96:b1:55:6b:14:6b:e1:83:cc:9c]
            modulus: 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
    public exponent: 10001

] 
2021-04-10 01:56:00.629  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-10 01:56:00.631 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-10 01:56:00.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:56:00.634 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-10 01:56:00.634  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-10 01:56:00.635  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-10 01:56:00.635  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-10 01:56:00.636  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-10 01:56:00.636  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-10 01:56:00.641  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-10 01:56:00.642  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:56:00.643  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-10 01:56:00.644  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-10 01:56:00.735  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-10 01:56:00.735  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-10 01:56:00.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-10 01:56:00.737 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-10 01:56:00.738  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1092
2021-04-10 01:56:00.738  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-10 01:56:00.739  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-10 01:56:00.739  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-10 01:56:00.740  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-10 01:56:00.740  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-10 01:56:00.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:56:00.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:56:00.740 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:56:00.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-10 01:56:00.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-10 01:56:00.741 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-10 01:56:00.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-10 01:56:00.746 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 634875118917519478164055113541738527393139073940
             IssuerDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 10 00:06:05 UTC 2021
           Final Date: Thu Apr 10 00:06:05 UTC 2031
            SubjectDN: UID=c-0e7f0ada7a86bc19e,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:f4:4d:99:8c:4e:9f:a8:65:c1:25:16:5c:d4:94:b6:5f:a2:93:57]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 0b0c7625919918655e835c827461f5d6f39e9abd
                       20b91c96096d9987d0cdac4a348ec61b089f120c
                       8c834892715417e42d5ed339da906e03a87774c7
                       cd43a4e7bcfd9acccd42d83fb72ffee1143e5045
                       6f08fcafbd90b92ba6c826a0cdadede030581419
                       3b30a28e0279d6822f5d0f2d1b9eaa1c2c4b3dd0
                       2b6aca5de14948c250c63f2579e4b358b490791b
                       5e484b7ef4ddb77d09794f5cb9586575b2672be7
                       b678bf1c12c01180d18259e5baedc45d934bca65
                       35509cc35f0039e26e12659dc6788350ee43b56c
                       074950c172d02bae9db39b94d8f75664d73ed310
                       2af1f35a1a769cdb88db8f54a9bc3427ee7cd699
                       2bcfb95a82b008b7fc21d82c534e60f2e6a8e5f2
                       1277d6d2fd506e7f7052a4da471984792603c954
                       ea145d0c353e031a844da1d9e8aa93c71498afe2
                       91dcae52c954fe35aaf9f65d90461087e68aabc6
                       9a637a4a1792db94a8985108f7de9eb941a6247a
                       1ce38b663c81a05d66229e36c2fbc26fb015d241
                       46e6fe1ba5e8588fc1e551208890982a57933598
                       f4dd17fa
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:b6:04:41:cb:34:9a:f0:bf:0c:3b:73:31:14:66:e7:28:ab:fd:3e]
            modulus: 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
    public exponent: 10001

]