Results

By type

          2021-04-22 06:58:17,171 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-04-22 06:58:21,087 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-04-22 06:58:23.757  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-04-22 06:58:34.673 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-04-22 06:58:35.566  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-04-22 06:58:36.161  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-04-22 06:58:48.966  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 34.098 seconds (JVM running for 40.455)
2021-04-22 07:52:54.065  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 07:52:54.162 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 07:52:54.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-22 07:52:54.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 07:52:54.358  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-22 07:52:54.362  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 07:52:54.366  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 07:52:54.448  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:52:54.450  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 07:52:54.460  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 07:52:54.471  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 07:52:54.656  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 07:52:54.665  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:52:54.665  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:52:54.758  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 07:52:55.871  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 07:52:55.874  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 07:52:55.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 07:52:55.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 07:52:55.964  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 07:52:55.965  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 07:52:55.970  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 07:52:55.971  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 07:52:56.051  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 07:52:56.052  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 07:52:56.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:52:56.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:52:56.054 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:52:56.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:52:56.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:52:56.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:52:56.157 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 07:52:56.261 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: d49171e251f7636c483083d0add2405ba6f528a885b2fb0269cb10993e77ed6fc479193c5a98c55be2c29c31aac0c0ace0cc8bfabf9d7a3c6b3f4fce09ea981ddc3a740582cfbc8f21f1532d13c2e56b8dbe73505b288d87aecc93cb2d757ca3cd7a45ddfff1454be12bdbfc923757b4bc80b5e1167640d9a12e0507bb3c99d9572f0e6fa772ba1848644cd99b89fff71e698929b18298685898846d0f5987130cbd7973b06d798a529127d88aeebae31a6d4b76b1a3f88e60eb1645b5862c3eb65f0c9d3c4acfc296e832c3fad146d93b73b46c67e43c8fce097054b49f289f60b35e6c1948ccaf693c327c18c52be7f57ec28c7c53734777cc704a5d862eb5f13d13333792bed159b91f85f5335647692962a1190e277e29396b7a9064e669621caf161f9833db0348878763cfc6ffd70903c5f2be55dff0893e2990e1167ea4a736ec3f59026449b97d9c4be2c1bcd365e7b692e17c6f5e5489c012caa0cdba8f7e469c93d282e0d092bc9d898bb009b8f1174261faddbec635240082d975
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:2a:db:c6:aa:84:9d:3e:63:48:86:0f:01:0a:a3:1a:d4:77:fc:65]
            modulus: 8d6e1d83261c8e2bd2af019e8c4235187bec1b161fd2aa55fe31ddd767a89e63cbbdf58f993b84cdc71747916f441ef64801310f2e9951be98e188875fc7ca396ef7a7442ed5091f41b6c7b9973aa5133e0c8cc700b26a2400305e18ececcb3c9587f47294f808cf8d14f7cab174b945bfd7e6dc46dd72f3d31347857ac52e6bb90f18f527bda832e078c727a817a0c623a36cb5f45b89a4ecc5d0531be2ff6b697b9e8d3c876292150b6e6f0f52aa530eae0e628c8ff82b5f1fa7c224731817bf09b3dcb6ea08cc2f3e58dc1ca4fb2c9c2d99b95249979d4ab760d1845655aa755d5f144a36cdb980bc71cd531c9f3c016e741a62e54870fb665c09fd11e723
    public exponent: 10001

] 
2021-04-22 07:54:09.052  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 07:54:09.057 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 07:54:09.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-22 07:54:09.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 07:54:09.061  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-22 07:54:09.061  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 07:54:09.062  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 07:54:09.062  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 07:54:09.063  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 07:54:09.070  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 07:54:09.071  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:54:09.071  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:54:09.154  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 07:54:09.350  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 07:54:09.351  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 07:54:09.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 07:54:09.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 07:54:09.357  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 07:54:09.357  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 07:54:09.361  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 07:54:09.362  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 07:54:09.362  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 07:54:09.363  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 07:54:09.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:54:09.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:54:09.364 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:54:09.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:54:09.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:54:09.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:54:09.366 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 07:54:09.454 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b9:46:51:b8:a1:64:bc:4b:bd:33:a3:fb:5a:b2:16:d4:54:6c:e9:78]
            modulus: 89331974671c59886ac834e5c26f5d10c75a29455e01d17f8020e132e90fff874ed0c4dd18369f459bcbfc2b111f84c46aff340be71ef4fe69bb10bc2b253663f68ec31f287876a7e7664daed7058f92de9517f24f1fd177b7f4953f8d7c53e3fb0520e48c6ffdc646756fef7aaab2a658eb3a2c7d735211beb5ae898f883120e2dcbf3dd5e812a72a61540d2dc7fb88f476d3cdceec0efd6e8676db95b0bc51b507ab359a80068c8fbd2eeabc23e4f845350eae2ef9a0fee86bc1283840ddae317954c2cf3b7bd41096b374a9dcb53ab88e5e4d5096f38aff806a37f5fd90091697c300f3370a513a396513f860dc885f2b91b1f5bdeabc553d881830828dcd
    public exponent: 10001

] 
2021-04-22 07:56:50.525  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 07:56:50.527 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 07:56:50.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-22 07:56:50.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 07:56:50.530  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-22 07:56:50.531  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 07:56:50.531  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 07:56:50.532  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 07:56:50.532  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 07:56:50.539  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 07:56:50.540  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:56:50.540  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:56:50.541  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 07:56:50.643  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 07:56:50.649  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 07:56:50.650 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 07:56:50.654 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 07:56:50.655  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 07:56:50.656  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 07:56:50.658  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 07:56:50.658  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 07:56:50.659  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 07:56:50.659  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 07:56:50.660 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:56:50.664 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:56:50.665 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:56:50.666 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:56:50.666 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:56:50.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:56:50.667 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 07:56:50.755 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: d49171e251f7636c483083d0add2405ba6f528a885b2fb0269cb10993e77ed6fc479193c5a98c55be2c29c31aac0c0ace0cc8bfabf9d7a3c6b3f4fce09ea981ddc3a740582cfbc8f21f1532d13c2e56b8dbe73505b288d87aecc93cb2d757ca3cd7a45ddfff1454be12bdbfc923757b4bc80b5e1167640d9a12e0507bb3c99d9572f0e6fa772ba1848644cd99b89fff71e698929b18298685898846d0f5987130cbd7973b06d798a529127d88aeebae31a6d4b76b1a3f88e60eb1645b5862c3eb65f0c9d3c4acfc296e832c3fad146d93b73b46c67e43c8fce097054b49f289f60b35e6c1948ccaf693c327c18c52be7f57ec28c7c53734777cc704a5d862eb5f13d13333792bed159b91f85f5335647692962a1190e277e29396b7a9064e669621caf161f9833db0348878763cfc6ffd70903c5f2be55dff0893e2990e1167ea4a736ec3f59026449b97d9c4be2c1bcd365e7b692e17c6f5e5489c012caa0cdba8f7e469c93d282e0d092bc9d898bb009b8f1174261faddbec635240082d975
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:9f:64:8d:db:07:69:f0:a1:6f:3c:a5:8e:ec:44:7a:8d:c6:ce:58]
            modulus: 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
    public exponent: 10001

] 
2021-04-22 07:57:33.434  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 07:57:33.436 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 07:57:33.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-22 07:57:33.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 07:57:33.439  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-22 07:57:33.440  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 07:57:33.440  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 07:57:33.441  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 07:57:33.441  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 07:57:33.454  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 07:57:33.456  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:57:33.457  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:57:33.459  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 07:57:33.573  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 07:57:33.574  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 07:57:33.574 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 07:57:33.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 07:57:33.576  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 07:57:33.576  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 07:57:33.577  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 07:57:33.578  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 07:57:33.578  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 07:57:33.578  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 07:57:33.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:57:33.579 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:57:33.579 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:57:33.579 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:57:33.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:57:33.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:57:33.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 07:57:33.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:76:d6:97:b2:f5:80:6a:62:76:47:ec:be:fa:aa:b4:f9:55:dd:de]
            modulus: 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
    public exponent: 10001

] 
2021-04-22 07:58:11.389  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 07:58:11.390 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 07:58:11.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-22 07:58:11.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 07:58:11.392  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-22 07:58:11.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 07:58:11.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 07:58:11.394  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 07:58:11.394  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 07:58:11.398  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 07:58:11.399  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:58:11.399  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:58:11.400  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 07:58:11.547  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 07:58:11.548  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 07:58:11.548 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 07:58:11.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 07:58:11.551  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 07:58:11.551  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 07:58:11.552  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 07:58:11.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 07:58:11.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 07:58:11.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 07:58:11.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:58:11.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:58:11.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:58:11.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:58:11.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:58:11.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:58:11.556 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 07:58:11.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:83:7b:af:2a:fe:8a:6d:c6:04:a5:69:ba:27:97:1c:d9:59:37:33]
            modulus: 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
    public exponent: 10001

] 
2021-04-22 07:58:18.169  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 07:58:18.170 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 07:58:18.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-22 07:58:18.172 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 07:58:18.172  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-22 07:58:18.173  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 07:58:18.173  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 07:58:18.173  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 07:58:18.174  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 07:58:18.178  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 07:58:18.178  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:58:18.179  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:58:18.180  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 07:58:18.324  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 07:58:18.325  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 07:58:18.325 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 07:58:18.326 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 07:58:18.326  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 07:58:18.327  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 07:58:18.349  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 07:58:18.349  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 07:58:18.350  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 07:58:18.350  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 07:58:18.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:58:18.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:58:18.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:58:18.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:58:18.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:58:18.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:58:18.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 07:58:18.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:e6:82:7e:29:83:c7:9a:84:51:37:0c:7a:ee:c7:9d:ed:d4:45:e3]
            modulus: 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
    public exponent: 10001

] 
2021-04-22 07:58:51.939  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 07:58:51.940 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 07:58:51.941 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-22 07:58:51.942 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 07:58:51.943  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-22 07:58:51.943  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 07:58:51.944  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 07:58:51.944  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 07:58:51.945  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 07:58:51.949  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 07:58:51.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:58:51.956  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 07:58:51.957  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 07:58:52.048  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 07:58:52.050  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 07:58:52.051 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 07:58:52.054 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 07:58:52.055  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 07:58:52.056  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 07:58:52.058  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 07:58:52.059  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 07:58:52.060  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 07:58:52.060  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 07:58:52.061 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:58:52.061 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:58:52.062 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:58:52.063 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 07:58:52.063 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 07:58:52.063 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 07:58:52.064 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 07:58:52.068 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:bb:d3:1f:98:34:82:18:73:66:8e:4f:43:b3:75:0d:91:a9:0e:3d]
            modulus: aa36fe9619499fac1c6006128a7be2d619a6c10f6a947ed3141bcf8f7d8e6355c7cc5e62876a708d1f15d70912763d77cb0aa214c4cef6381f80adca34f1bc76509466ced40c25ff040657ca2761a7ffdaed927a36daba7dc75171d3ea71eaf770d099fb345f08c2cfdf990b38813fd3374333a18d62c6e6ea50986221830d9ab63bd197d27a4db573b9b6f55242cea9d08cbfd0b93e4f4f077b544998dd09f67249a0f740bb0c710274a70158dba9bcfbc2f5dc4d83522d444922d0637e421506655d177253c1de219e9e33c579d711125d347ed632a1c4795faba0d2fa9d0d0e26cb87629f099f14e45e096fee15a9a7259828b69aedafaa9b467ac9731293
    public exponent: 10001

] 
2021-04-22 08:00:26.464  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 08:00:26.465 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 08:00:26.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-04-22 08:00:26.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 08:00:26.467  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-04-22 08:00:26.468  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 08:00:26.468  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 08:00:26.468  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 08:00:26.468  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 08:00:26.473  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 08:00:26.473  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 08:00:26.474  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 08:00:26.475  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 08:00:26.578  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 08:00:26.579  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 08:00:26.579 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 08:00:26.581 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 08:00:26.582  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 08:00:26.582  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 08:00:26.585  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 08:00:26.586  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 08:00:26.587  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 08:00:26.587  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 08:00:26.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 08:00:26.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 08:00:26.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 08:00:26.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 08:00:26.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 08:00:26.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 08:00:26.591 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 08:00:26.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:a6:64:f0:0a:2f:eb:21:97:a3:c0:4e:68:99:fa:ba:b3:e6:15:09]
            modulus: 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
    public exponent: 10001

] 
2021-04-22 08:03:16.233  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 08:03:16.234 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 08:03:16.235 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-22 08:03:16.235 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 08:03:16.236  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-22 08:03:16.236  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 08:03:16.236  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 08:03:16.237  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 08:03:16.237  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 08:03:16.241  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 08:03:16.241  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 08:03:16.241  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 08:03:16.242  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 08:03:16.362  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 08:03:16.362  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 08:03:16.362 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 08:03:16.364 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 08:03:16.364  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 08:03:16.364  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 08:03:16.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 08:03:16.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 08:03:16.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 08:03:16.366  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 08:03:16.366 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 08:03:16.367 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 08:03:16.367 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 08:03:16.367 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 08:03:16.367 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 08:03:16.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 08:03:16.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 08:03:16.370 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:f9:6c:41:16:8c:a4:25:f3:78:39:9c:b4:43:a3:3a:0b:a5:dd:0b]
            modulus: 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
    public exponent: 10001

] 
2021-04-22 08:05:53.392  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 08:05:53.393 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 08:05:53.394 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-22 08:05:53.395 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 08:05:53.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-22 08:05:53.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 08:05:53.396  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 08:05:53.396  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 08:05:53.396  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 08:05:53.400  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 08:05:53.400  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 08:05:53.400  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 08:05:53.401  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 08:05:53.532  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 08:05:53.548  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 08:05:53.549 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 08:05:53.550 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 08:05:53.550  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 08:05:53.550  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 08:05:53.552  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 08:05:53.552  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 08:05:53.552  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 08:05:53.552  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 08:05:53.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 08:05:53.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 08:05:53.553 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 08:05:53.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 08:05:53.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 08:05:53.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 08:05:53.555 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 08:05:53.557 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6f:9c:52:7a:2d:54:7d:c4:c1:fb:8c:6f:ef:57:c4:69:ce:2e:4d:e9]
            modulus: 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
    public exponent: 10001

] 
2021-04-22 08:07:47.867  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 08:07:47.868 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 08:07:47.869 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-22 08:07:47.870 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 08:07:47.870  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-22 08:07:47.870  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 08:07:47.871  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 08:07:47.871  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 08:07:47.871  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 08:07:47.877  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 08:07:47.878  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 08:07:47.878  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 08:07:47.948  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 08:07:48.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 08:07:48.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 08:07:48.075 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 08:07:48.076 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 08:07:48.076  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 08:07:48.077  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 08:07:48.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 08:07:48.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 08:07:48.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 08:07:48.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 08:07:48.078 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 08:07:48.079 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 08:07:48.079 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 08:07:48.079 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 08:07:48.080 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 08:07:48.080 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 08:07:48.081 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 08:07:48.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8e:29:ca:81:69:25:0f:71:29:e0:c0:cf:85:62:e1:9c:2f:16:ab:bf]
            modulus: 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
    public exponent: 10001

] 
2021-04-22 08:09:13.678  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-22 08:09:13.679 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-22 08:09:13.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-22 08:09:13.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-22 08:09:13.681  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-22 08:09:13.681  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-22 08:09:13.681  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-22 08:09:13.681  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-22 08:09:13.682  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-22 08:09:13.686  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-22 08:09:13.686  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 08:09:13.686  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-22 08:09:13.687  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-22 08:09:13.817  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-22 08:09:13.817  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-22 08:09:13.817 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-22 08:09:13.818 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-22 08:09:13.819  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1592
2021-04-22 08:09:13.819  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-22 08:09:13.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-22 08:09:13.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-22 08:09:13.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-22 08:09:13.821  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-22 08:09:13.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 08:09:13.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 08:09:13.821 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 08:09:13.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-22 08:09:13.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-22 08:09:13.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-22 08:09:13.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-22 08:09:13.825 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 396216051902548796054233811538875513824926676440
             IssuerDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Apr 22 00:20:40 UTC 2021
           Final Date: Tue Apr 22 00:20:40 UTC 2031
            SubjectDN: UID=c-0198c2c5ca35e2502,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [90:56:c9:9a:db:3a:11:c6:35:79:49:fa:c4:e0:16:26:d6:8f:f3:19]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 689b65e2ddcae850fe3d9b4daf777f5d98b546ae
                       d1a086e638a0ed66322a1fbec20fc7243ddc246f
                       8cbbfaef816bfc28c3d31b919cd67e54596ad563
                       aa888b536bdc0c6b0d9ee3f52b0bc7cb1b82f8c8
                       c584e2114af3241903af7659980c2e38f3bea069
                       0b144fb55415e59faa13a3d7b062e8b379f651c3
                       5a49c5fcc599ba164bb90728a6aae7206c28cffd
                       9c1c71240411ad119494c1cc1a6b20cc25dee103
                       a9e657c8fd458576cf4a2ddb764765752afa8d16
                       c47742298279c5c00c8cd6c96797169dfa856867
                       2e1143d01aec9a8a9e4ffa0ba461108e1353c3eb
                       7dfca48f3bec8e147642d4ea0f65691b69a1334f
                       72be4bc00441fa69ed77e4393f403f561704b149
                       4258645b47cb65823b412271cfa97042a4299b14
                       0d0ee0281f1c5ea44a017ea07cd5231257519533
                       b12f6c64133c7a46122922006dbb974b2256887f
                       123577397e162fc37596040788774c0566f8faa5
                       96ecfcd9275c7cd2f9ad1612c8244968a479ec15
                       83047dcfac0462f69d83724790da9e444f79f781
                       ef63bb3e
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:75:13:c4:49:f5:a9:e1:ea:95:67:d1:9a:47:fe:6d:de:71:a0:ac]
            modulus: 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
    public exponent: 10001

]