Results

By type

          2021-05-01 00:13:43,356 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-01 00:13:47,457 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-01 00:13:50.165  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-01 00:14:00.867 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-01 00:14:01.957  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-01 00:14:02.659  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-01 00:14:16.068  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 34.903 seconds (JVM running for 41.391)
2021-05-01 00:25:35.761  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 00:25:35.856 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 00:25:35.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-01 00:25:35.976 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 00:25:36.065  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-01 00:25:36.069  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 00:25:36.074  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 00:25:36.154  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 00:25:36.155  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 00:25:36.164  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 00:25:36.168  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 00:25:36.366  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 00:25:36.374  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 00:25:36.375  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 00:25:36.462  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 00:25:37.566  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 00:25:37.570  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 00:25:37.570 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 00:25:37.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 00:25:37.657  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 00:25:37.657  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 00:25:37.660  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 00:25:37.661  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 00:25:37.667  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 00:25:37.667  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 00:25:37.668 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 00:25:37.669 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 00:25:37.669 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 00:25:37.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 00:25:37.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 00:25:37.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 00:25:37.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 00:25:37.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:89:74:db:3b:8e:59:75:99:ca:c1:f1:9c:06:4d:56:0e:29:5a:b3]
            modulus: 859320c5748926120eedffeab71e2b4ba6da730f5d76712c2b02a8e43e6b912e7a33c1e6f695c7751e6ced132a3e466f5e0e9bdb7c06f24500fd0ec2e5521766183cf002d1685413de6c42f569ed1c5281a8bdd6d8a805a7d68c3d1051ab3b4204ab3ca62fbb74b15e1b1741757c0eea90c994554ece3d8c36130d56b7490862c1fd3da7da4ffcc33ea1986117aa7cc97e5049a980c794285e22aede0280660a946f2c958565722815200ad19faf60d3c390e5ca0ac95e39bedd6c765998467e7eac7cde1698c247ec2150df5b0a4144235b04453cb395515d661fbc5fe5011c3ba0e6e109f809261dc2850e558913fe74a4bb292c07df626fc9e51007aeba63
    public exponent: 10001

] 
2021-05-01 01:21:34.444  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:21:34.446 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:21:34.448 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 01:21:34.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:21:34.450  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 01:21:34.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:21:34.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:21:34.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:21:34.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:21:34.458  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:21:34.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:21:34.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:21:34.462  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:21:34.630  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:21:34.631  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:21:34.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:21:34.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:21:34.656  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:21:34.657  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:21:34.659  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:21:34.659  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:21:34.660  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:21:34.660  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:21:34.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:21:34.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:21:34.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:21:34.666 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:21:34.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:21:34.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:21:34.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:21:34.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 9485ef3ffdfc78fd491eb34c31456215d8001af71eccf8cb622d9b1aadb6efce128a1d1624de006eaa70c3b54c6123a7386177a420b1d71eee562d751b020472d005fcf40a8d503a43f7007e900f57e91eef21053568b792027c214846f64996ad44e1fb414d101655916ebb7f1169e6b6d66755f31bf41d4bbe3ffd8580574766cda7eb9dfc4adde9f70d957837f059573dd2b54af61442032751c246b51377d57fb8bca2e252236fced666792418cf35e87974a3e4dd71e5683358615086522c109ebe03604a74fee4527d3c873b8e305f5ea3a7b6c80639836f734c0fe224e548c625ade91bb2ee9e52a383a007c841f1cf90ab78dccb30ff599a5f76db82d9e39f746730385a4c556546025ee22bf5dc32876e4f04612df0cb01a4ee36de77a7956075a2e9773459a860ed9d41fdcd17e11c3e754013e5b54e3d190a44add0f8071b1893595dd0c71edf4e05afa9e7f17e9e6523e702a776f3f006467598da6fcb99c2cb8431d25b49be17a11baad26eae095cfe1b3292b08581f0e24fb3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:2e:36:32:01:c3:f4:bb:3d:79:d2:1d:cf:99:b5:27:5f:78:48:9c]
            modulus: 8ec9e0ad9293ec429dd66f776df02577aafd1b552f0c99f4c532a4f6c58bc770285ad55f005266e05cb756c8a258bd19c70a5c86c5b2d50bbfc3f016a360d45d228ecd76821f4bdd16206132567dd8f6ff597e95f6249245b4aec435cce5bbaedbfbedf75cd3400e8a09bda77bc01719a482b3743bf426bf52b1d63ddc2d26e354322053fbe978f0dbc54354a04b0663adc8b8f3348c61adc688f6ed93de3ebbdc3283fa529566e0a5b7bb1bd38a265279c6160e02caa73c5c4136aa62208c8299ce59bf142392f68b963765dc5b91260ffdbd34d58ffcfea873bd6c950db217ff36dcbb2d6a2a4c560a01613cd19aa99d07288f0f1e5f4e4b567fe8b3935663
    public exponent: 10001

] 
2021-05-01 01:22:55.212  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:22:55.213 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:22:55.214 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-01 01:22:55.215 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:22:55.216  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-01 01:22:55.216  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:22:55.217  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:22:55.217  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:22:55.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:22:55.224  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:22:55.224  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:22:55.225  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:22:55.226  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:22:55.391  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:22:55.391  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:22:55.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:22:55.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:22:55.454  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:22:55.455  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:22:55.457  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:22:55.458  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:22:55.458  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:22:55.459  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:22:55.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:22:55.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:22:55.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:22:55.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:22:55.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:22:55.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:22:55.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:22:55.474 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:c1:5a:69:bd:6b:92:cc:1c:f7:f1:06:6c:15:c1:5e:30:96:6e:44]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 01:25:59.844  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:25:59.845 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:25:59.846 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-01 01:25:59.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:25:59.847  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-01 01:25:59.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:25:59.848  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:25:59.849  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:25:59.849  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:25:59.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:25:59.855  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:25:59.855  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:25:59.857  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:25:59.986  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:25:59.987  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:25:59.987 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:25:59.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:25:59.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:25:59.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:25:59.992  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:25:59.993  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:25:59.993  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:25:59.994  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:25:59.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:25:59.994 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:25:59.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:25:59.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:25:59.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:25:59.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:26:00.054 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:26:00.058 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:5d:76:c3:d6:12:53:93:4b:9a:45:6c:08:13:0d:af:08:f1:82:48]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 01:26:28.348  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:26:28.349 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:26:28.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-01 01:26:28.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:26:28.351  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-01 01:26:28.352  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:26:28.352  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:26:28.352  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:26:28.353  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:26:28.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:26:28.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:26:28.358  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:26:28.359  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:26:28.458  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:26:28.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:26:28.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:26:28.460 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:26:28.461  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:26:28.461  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:26:28.462  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:26:28.463  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:26:28.464  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:26:28.464  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:26:28.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:26:28.465 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:26:28.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:26:28.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:26:28.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:26:28.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:26:28.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:26:28.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:26:41:9b:a0:4f:b9:d2:d9:09:dd:64:03:b9:b6:9a:2d:1b:83:6c]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 01:26:59.210  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:26:59.211 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:26:59.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-01 01:26:59.213 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:26:59.213  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-01 01:26:59.213  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:26:59.214  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:26:59.214  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:26:59.215  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:26:59.219  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:26:59.220  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:26:59.220  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:26:59.221  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:26:59.354  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:26:59.355  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:26:59.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:26:59.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:26:59.357  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:26:59.357  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:26:59.358  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:26:59.359  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:26:59.359  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:26:59.360  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:26:59.360 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:26:59.360 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:26:59.361 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:26:59.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:26:59.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:26:59.362 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:26:59.363 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:26:59.369 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:a3:f5:d0:bf:5b:2d:c7:43:22:6b:1f:59:ea:f1:2c:0f:e4:39:9e]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 01:27:16.890  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:27:16.891 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:27:16.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-01 01:27:16.892 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:27:16.893  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-01 01:27:16.894  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:27:16.894  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:27:16.895  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:27:16.895  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:27:16.899  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:27:16.900  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:27:16.900  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:27:16.901  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:27:17.005  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:27:17.054  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:27:17.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:27:17.056 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:27:17.057  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:27:17.057  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:27:17.058  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:27:17.059  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:27:17.059  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:27:17.060  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:27:17.060 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:27:17.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:27:17.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:27:17.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:27:17.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:27:17.062 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:27:17.063 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:27:17.066 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:c4:4e:1f:c7:7c:f2:e1:ec:5b:9a:1b:f2:96:5e:90:e5:10:17:d4]
            modulus: ddf29acee4008e53bed9e98e9477a665f5080ca811d07e95b39838b6f111f51081005606a71864650b1ff5c40a367111c4d344a10ece73e2a08c148ee76c7cf040700268b7f4e2a1f07594b059a35c3158540e1e28516c3b8d20e7a5f44aa4f69a775d9a244415e021d3e535180a5ba231469376fadc450f735809ed96f383c9fab75fe4edd88daaffe72bb1f2bf30a25e039c44b818fb05c68d2e82f4550bea3b8aca726c6defa47a190913252d01f14bdcf504742d4fcfec545418862c8d23e72f81565698f4d08fd749c08e9af38c2d24ea3461ae9302a9b39b2588a6b1935c567d9835ad294ec3e963e5ff3d582cf10c1a879ad18a1ac6e5278fdcafda23
    public exponent: 10001

] 
2021-05-01 01:28:07.562  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:28:07.563 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:28:07.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-01 01:28:07.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:28:07.565  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-01 01:28:07.565  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:28:07.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:28:07.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:28:07.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:28:07.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:28:07.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:28:07.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:28:07.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:28:07.666  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:28:07.667  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:28:07.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:28:07.668 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:28:07.668  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:28:07.669  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:28:07.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:28:07.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:28:07.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:28:07.671  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:28:07.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:28:07.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:28:07.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:28:07.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:28:07.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:28:07.673 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:28:07.674 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:28:07.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:91:d3:ee:5d:94:1f:f5:d8:5b:4e:c8:c0:38:e5:47:bf:1a:6e:9a]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 01:29:19.119  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:29:19.120 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:29:19.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-01 01:29:19.122 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:29:19.122  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-01 01:29:19.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:29:19.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:29:19.124  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:29:19.124  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:29:19.128  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:29:19.129  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:29:19.129  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:29:19.130  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:29:19.278  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:29:19.279  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:29:19.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:29:19.280 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:29:19.281  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:29:19.281  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:29:19.282  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:29:19.282  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:29:19.283  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:29:19.283  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:29:19.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:29:19.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:29:19.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:29:19.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:29:19.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:29:19.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:29:19.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:29:19.288 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:52:82:29:ce:e1:dc:8d:b0:fb:6f:0c:36:94:e0:eb:ee:3f:c0:e9]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 01:31:57.605  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:31:57.606 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:31:57.607 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 01:31:57.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:31:57.608  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 01:31:57.608  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:31:57.609  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:31:57.609  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:31:57.609  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:31:57.613  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:31:57.613  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:31:57.614  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:31:57.615  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:31:57.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:31:57.757  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:31:57.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:31:57.759 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:31:57.759  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:31:57.760  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:31:57.761  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:31:57.761  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:31:57.761  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:31:57.762  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:31:57.762 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:31:57.762 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:31:57.762 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:31:57.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:31:57.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:31:57.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:31:57.764 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:31:57.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:11:77:73:33:e5:bd:87:95:06:d0:45:7e:16:e4:dd:93:13:fd:ec]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 01:34:56.328  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:34:56.329 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:34:56.330 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 01:34:56.331 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:34:56.331  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 01:34:56.331  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:34:56.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:34:56.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:34:56.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:34:56.336  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:34:56.337  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:34:56.337  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:34:56.338  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:34:56.448  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:34:56.449  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:34:56.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:34:56.451 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:34:56.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:34:56.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:34:56.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:34:56.453  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:34:56.453  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:34:56.453  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:34:56.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:34:56.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:34:56.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:34:56.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:34:56.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:34:56.455 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:34:56.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:34:56.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:73:b2:15:80:04:63:5a:4a:f8:c1:5c:5f:4e:db:02:c4:c7:43:4c]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 01:36:40.999  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:36:41.002 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:36:41.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 01:36:41.003 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:36:41.003  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 01:36:41.004  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:36:41.004  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:36:41.004  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:36:41.005  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:36:41.009  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:36:41.009  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:36:41.009  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:36:41.010  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:36:41.113  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:36:41.114  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:36:41.114 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:36:41.115 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:36:41.116  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:36:41.116  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:36:41.117  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:36:41.117  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:36:41.118  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:36:41.118  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:36:41.118 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:36:41.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:36:41.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:36:41.119 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:36:41.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:36:41.120 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:36:41.121 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:36:41.124 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 9485ef3ffdfc78fd491eb34c31456215d8001af71eccf8cb622d9b1aadb6efce128a1d1624de006eaa70c3b54c6123a7386177a420b1d71eee562d751b020472d005fcf40a8d503a43f7007e900f57e91eef21053568b792027c214846f64996ad44e1fb414d101655916ebb7f1169e6b6d66755f31bf41d4bbe3ffd8580574766cda7eb9dfc4adde9f70d957837f059573dd2b54af61442032751c246b51377d57fb8bca2e252236fced666792418cf35e87974a3e4dd71e5683358615086522c109ebe03604a74fee4527d3c873b8e305f5ea3a7b6c80639836f734c0fe224e548c625ade91bb2ee9e52a383a007c841f1cf90ab78dccb30ff599a5f76db82d9e39f746730385a4c556546025ee22bf5dc32876e4f04612df0cb01a4ee36de77a7956075a2e9773459a860ed9d41fdcd17e11c3e754013e5b54e3d190a44add0f8071b1893595dd0c71edf4e05afa9e7f17e9e6523e702a776f3f006467598da6fcb99c2cb8431d25b49be17a11baad26eae095cfe1b3292b08581f0e24fb3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:11:dd:07:ce:59:10:ae:8c:be:4b:97:c4:19:5f:30:c7:53:1b:e2]
            modulus: a9520b95493a67050af5191339dde565643cbeff322f48a530cde8de5375ecd1d5eeba35204c797c7c3159fd19b43a026cc52480c5805796efd3ec7202a4e5b275126818677e69c0794095782c7a58f3fd02bd01f5d7852efae5f4ad62454132640378aa1627c540c42ef9303f336bbd9136c4e04c99606c8d7cfa04cceab263ed33c9f7b422bddfb11aafbc1d6e7fb5c7b188ed4eabc245ad8fc0e147a4022527d8dea4c697cc30830b880346a0d574bd6c869f0735a19d0fed7e2437030a98c5d57271eb09d6fda00c6042b034081f84811a1ebfca82f4157d23107ed303e6a36981bfd946c4e01b4fc01cf99c5d3669b61d62b781ffc694c66a5685dd4f05
    public exponent: 10001

] 
2021-05-01 01:38:04.661  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 01:38:04.662 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 01:38:04.663 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 01:38:04.664 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 01:38:04.664  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 01:38:04.665  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 01:38:04.665  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 01:38:04.665  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 01:38:04.666  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 01:38:04.670  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 01:38:04.670  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:38:04.670  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 01:38:04.671  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 01:38:04.775  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 01:38:04.775  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 01:38:04.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 01:38:04.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 01:38:04.777  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 01:38:04.777  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 01:38:04.778  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 01:38:04.778  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 01:38:04.779  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 01:38:04.779  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 01:38:04.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:38:04.780 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:38:04.780 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:38:04.780 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 01:38:04.781 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 01:38:04.781 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 01:38:04.782 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 01:38:04.784 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:15:ef:a0:a3:72:3f:73:c6:22:33:c0:34:27:5d:1d:29:03:fa:75]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 05:55:43.088  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 05:55:43.090 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 05:55:43.091 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-01 05:55:43.092 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 05:55:43.092  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-01 05:55:43.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 05:55:43.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 05:55:43.093  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 05:55:43.094  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 05:55:43.098  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 05:55:43.099  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 05:55:43.099  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 05:55:43.100  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 05:55:43.281  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 05:55:43.282  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 05:55:43.282 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 05:55:43.284 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 05:55:43.284  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1118
2021-05-01 05:55:43.285  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 05:55:43.286  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 05:55:43.286  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 05:55:43.286  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 05:55:43.287  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 05:55:43.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 05:55:43.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 05:55:43.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 05:55:43.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 05:55:43.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 05:55:43.289 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 05:55:43.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 05:55:43.294 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 125650379731563525896185753820732901588549361671
             IssuerDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 00:09:19 UTC 2021
           Final Date: Thu May 01 00:09:19 UTC 2031
            SubjectDN: UID=c-08395f84f3d6d6932,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ee:ec:0b:3e:62:3d:95:18:b7:e2:1c:18:9a:b3:3b:3f:cb:4c:9f:75]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8d871f70d9f9619d39888e17c1a806db43503683
                       27c873b7c14dc4bba5c4e22a5e371322f5f39b51
                       dc149ac0b40e4ff95e57ebcd50f2545da957932a
                       2072de8d2c99c111d4079386759f255d6695f1f7
                       728f07be3102f43c8c9127ba5bb79499e3713537
                       aa6d808e93485b6f7a053d69e96d1cf2e661a1ad
                       ae98e8cb470eb4730cccdaddc21d8e6ca6d6c63e
                       822cbd178d87e14a7ba8147982d1370b447fe0f3
                       be12d6f96cc1ac7ca18c3a800fe2ed54e9c9b05a
                       6fbae347d0877917c68fd1badadd5a4db0b000f9
                       bb490ede66b179c48d671ca2d456e8aae2ad1098
                       f0a653110c3ade53dcfedf7f2336bc43216653ba
                       ce52bd87976e1299208d0d62e2d0bb64aa4cfa20
                       9f2853ce59056af621515fc1a18bc3b9932edeb6
                       50fa880c0c39c40d4499698a166302de53bd3685
                       192157b583b0d99f34cd1ef888c38e154241e852
                       da20911d285d01b0e93822931796cf0de4d71b4e
                       0aedefd066b2e65317a455222bda5bc22cd5968a
                       b51cf91282196fb16778d2ca6c460253193b8ecf
                       0483d9ef
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:2f:78:7e:8c:5b:16:bc:d1:c5:11:0f:b2:13:45:49:9b:6e:4b:1a]
            modulus: 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
    public exponent: 10001

]