Results

By type

          2021-05-29 23:22:02,980 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-29 23:22:06,505 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-29 23:22:08.968  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-29 23:22:19.166 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-29 23:22:20.063  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-29 23:22:20.663  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-29 23:22:32.187  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 31.407 seconds (JVM running for 37.5)
2021-05-29 23:35:39.472  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-29 23:35:39.480 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-29 23:35:39.583 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-29 23:35:39.587 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-29 23:35:39.671  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-29 23:35:39.675  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-29 23:35:39.764  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 23:35:39.765  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 23:35:39.765  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-29 23:35:39.772  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-29 23:35:39.775  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-29 23:35:39.876  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-29 23:35:39.883  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 23:35:39.883  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-29 23:35:39.973  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-29 23:35:41.038  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-29 23:35:41.042  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-29 23:35:41.042 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-29 23:35:41.047 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-29 23:35:41.062  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-29 23:35:41.062  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-29 23:35:41.065  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-29 23:35:41.066  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-29 23:35:41.072  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-29 23:35:41.072  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-29 23:35:41.073 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 23:35:41.074 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 23:35:41.074 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 23:35:41.167 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-29 23:35:41.168 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-29 23:35:41.168 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-29 23:35:41.174 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-29 23:35:41.281 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:4a:09:28:df:2b:a8:77:10:a5:1d:ee:7a:27:a0:25:3b:89:ca:b9]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:43:03.688  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:43:03.694 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:43:03.696 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 00:43:03.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:43:03.701  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 00:43:03.762  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:43:03.763  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:43:03.763  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:43:03.764  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:43:03.773  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:43:03.774  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:43:03.775  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:43:03.780  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:43:03.987  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:43:03.988  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:43:03.989 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:43:03.993 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:43:03.994  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:43:03.994  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:43:03.997  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:43:03.998  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:43:03.999  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:43:04.000  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:43:04.000 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:43:04.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:43:04.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:43:04.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:43:04.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:43:04.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:43:04.004 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:43:04.063 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:d9:b6:88:66:bc:09:d1:97:94:ef:8c:08:2b:3a:8b:60:c4:77:d3]
            modulus: a01a2f1c2cc26b426c96ddfe8870d8bc14fbc7c56134cf9560c6b4b8b76b41471f26f1a1639208d2c4136e32bec3389695ee37a3c223daa64e4effa17b51abe79333cdcf38183235bb9773d0205ad4c83f6b35e827c9063abe4edacf357a9809a3b7ebf5709358a50dd88e3a2975019b5f80733748297466e062dfb9cc0f90d9138396bbac1a1ba05ab08b2ede9bd718d6cf216e9079200c6b701b564cb6c57689e4550dfdcc4c2ae15a01fee5e1f4bec5175814369661861b0e586ca97014f1b1f45ed2212eba7552af02fd207e7732127ce79acc1662d356fe472f0f38251af0464db39276423e78d6e3bc57db9dcc81abc8a1a317d00f62802e21becbab8d
    public exponent: 10001

] 
2021-05-30 00:48:28.088  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:48:28.089 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:48:28.090 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 00:48:28.091 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:48:28.091  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 00:48:28.092  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:48:28.092  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:48:28.093  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:48:28.093  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:48:28.097  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:48:28.098  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:48:28.098  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:48:28.100  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:48:28.227  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:48:28.228  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:48:28.228 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:48:28.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:48:28.231  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:48:28.231  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:48:28.233  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:48:28.234  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:48:28.234  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:48:28.235  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:48:28.236 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:48:28.236 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:48:28.236 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:48:28.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:48:28.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:48:28.238 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:48:28.238 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:48:28.262 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: dc4472c95bcc9b8d99fe835cc598e11f4ca8ef993f1b02d0c250308c923c2b77169338cea429c17ec1f32c24d3be2d8d9bd446a9e305eea187d2df5f9531e0ef440d2e79fca871cf0578c047a8a9322503bf1e2512699117a2a838dd5b4a03e169faec5871769ccf48ae6c6f8a424cf7d998d5e570f3a24d4dbbaddf3e93ebaf40295902518097ec632617f7417c817fa9364681d99065dbdc4fb40e12b5122efdd223b8f21cb6f800ee87f9243529f7f01c320bd394613865497479b21482acd07d4663f57e5aea075e98823057a4ea04da89f2df064ee9fb64b99e7c418f33023b20cdd4f4a27cdcd2e8d0df8b1d68e742dc2bcb5e7e4895656557693e824346e47fb48d1993ff5df0d13220b0cd0b7b92b65fb1abbc91decf65276c09020dcd7856a5b140d8ab5d772c6e479fae67c3102222e9c10be0670199023ace8d3294e5ebdd83fd4bbc3dd3bba7ddc66665c7a088c2fb98015808261e3ed480bc32c795fd973309502b8afd5f7a9d1e3c1606698f18f9f0b4b4090f9c5434aa0fdd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:05:61:11:38:53:f7:f8:b4:61:6c:15:b3:f4:b9:a3:49:69:9a:42]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:48:45.759  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:48:45.760 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:48:45.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-30 00:48:45.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:48:45.762  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-30 00:48:45.762  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:48:45.763  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:48:45.763  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:48:45.764  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:48:45.771  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:48:45.772  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:48:45.772  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:48:45.773  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:48:45.855  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:48:45.855  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:48:45.856 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:48:45.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:48:45.863  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:48:45.863  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:48:45.864  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:48:45.865  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:48:45.865  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:48:45.865  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:48:45.866 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:48:45.866 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:48:45.866 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:48:45.867 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:48:45.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:48:45.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:48:45.872 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:48:45.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: dc4472c95bcc9b8d99fe835cc598e11f4ca8ef993f1b02d0c250308c923c2b77169338cea429c17ec1f32c24d3be2d8d9bd446a9e305eea187d2df5f9531e0ef440d2e79fca871cf0578c047a8a9322503bf1e2512699117a2a838dd5b4a03e169faec5871769ccf48ae6c6f8a424cf7d998d5e570f3a24d4dbbaddf3e93ebaf40295902518097ec632617f7417c817fa9364681d99065dbdc4fb40e12b5122efdd223b8f21cb6f800ee87f9243529f7f01c320bd394613865497479b21482acd07d4663f57e5aea075e98823057a4ea04da89f2df064ee9fb64b99e7c418f33023b20cdd4f4a27cdcd2e8d0df8b1d68e742dc2bcb5e7e4895656557693e824346e47fb48d1993ff5df0d13220b0cd0b7b92b65fb1abbc91decf65276c09020dcd7856a5b140d8ab5d772c6e479fae67c3102222e9c10be0670199023ace8d3294e5ebdd83fd4bbc3dd3bba7ddc66665c7a088c2fb98015808261e3ed480bc32c795fd973309502b8afd5f7a9d1e3c1606698f18f9f0b4b4090f9c5434aa0fdd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:b4:0e:c4:57:64:49:03:8d:b2:e0:8c:d1:87:0b:47:d6:1c:e5:2d]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:49:19.408  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:49:19.409 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:49:19.410 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-30 00:49:19.411 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:49:19.411  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-30 00:49:19.412  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:49:19.412  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:49:19.412  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:49:19.413  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:49:19.420  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:49:19.422  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:49:19.423  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:49:19.424  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:49:19.567  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:49:19.567  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:49:19.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:49:19.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:49:19.569  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:49:19.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:49:19.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:49:19.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:49:19.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:49:19.572  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:49:19.572 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:49:19.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:49:19.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:49:19.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:49:19.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:49:19.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:49:19.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:49:19.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [aa:0f:7a:2b:ff:b8:09:9f:dc:d1:b4:79:f1:84:c0:ce:1a:b9:e6:15]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:50:42.976  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:50:42.978 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:50:42.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 00:50:42.980 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:50:42.980  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 00:50:42.981  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:50:42.981  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:50:42.981  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:50:42.982  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:50:43.064  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:50:43.065  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:50:43.065  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:50:43.066  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:50:43.169  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:50:43.170  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:50:43.171 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:50:43.172 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:50:43.172  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:50:43.173  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:50:43.174  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:50:43.174  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:50:43.175  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:50:43.175  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:50:43.175 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:50:43.175 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:50:43.176 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:50:43.176 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:50:43.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:50:43.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:50:43.178 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:50:43.180 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:fa:47:5f:c9:c9:61:38:47:7d:65:bc:c3:67:82:3a:b7:04:01:3c]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:51:00.829  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:51:00.829 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:51:00.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-30 00:51:00.831 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:51:00.831  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-30 00:51:00.832  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:51:00.832  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:51:00.833  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:51:00.833  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:51:00.837  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:51:00.837  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:51:00.838  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:51:00.839  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:51:00.934  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:51:00.935  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:51:00.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:51:00.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:51:00.937  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:51:00.937  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:51:00.938  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:51:00.938  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:51:00.970  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:51:00.971  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:51:00.971 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:51:00.972 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:51:00.972 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:51:00.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:51:00.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:51:00.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:51:00.977 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:51:00.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [63:e3:48:01:82:d6:c0:64:1f:af:11:ce:cf:7d:66:6a:ae:ff:f3:5e]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:52:12.867  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:52:12.868 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:52:12.869 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 00:52:12.874 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:52:12.874  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 00:52:12.876  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:52:12.876  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:52:12.877  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:52:12.877  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:52:12.884  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:52:12.885  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:52:12.885  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:52:12.887  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:52:13.056  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:52:13.061  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:52:13.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:52:13.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:52:13.070  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:52:13.071  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:52:13.072  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:52:13.073  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:52:13.073  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:52:13.162  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:52:13.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:52:13.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:52:13.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:52:13.164 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:52:13.164 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:52:13.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:52:13.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:52:13.169 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: dc4472c95bcc9b8d99fe835cc598e11f4ca8ef993f1b02d0c250308c923c2b77169338cea429c17ec1f32c24d3be2d8d9bd446a9e305eea187d2df5f9531e0ef440d2e79fca871cf0578c047a8a9322503bf1e2512699117a2a838dd5b4a03e169faec5871769ccf48ae6c6f8a424cf7d998d5e570f3a24d4dbbaddf3e93ebaf40295902518097ec632617f7417c817fa9364681d99065dbdc4fb40e12b5122efdd223b8f21cb6f800ee87f9243529f7f01c320bd394613865497479b21482acd07d4663f57e5aea075e98823057a4ea04da89f2df064ee9fb64b99e7c418f33023b20cdd4f4a27cdcd2e8d0df8b1d68e742dc2bcb5e7e4895656557693e824346e47fb48d1993ff5df0d13220b0cd0b7b92b65fb1abbc91decf65276c09020dcd7856a5b140d8ab5d772c6e479fae67c3102222e9c10be0670199023ace8d3294e5ebdd83fd4bbc3dd3bba7ddc66665c7a088c2fb98015808261e3ed480bc32c795fd973309502b8afd5f7a9d1e3c1606698f18f9f0b4b4090f9c5434aa0fdd
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:39:aa:9e:7c:94:87:51:e1:86:54:ed:30:38:fc:56:9a:b0:94:dc]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:52:54.652  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:52:54.652 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:52:54.653 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-30 00:52:54.654 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:52:54.654  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-30 00:52:54.655  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:52:54.655  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:52:54.655  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:52:54.655  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:52:54.659  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:52:54.660  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:52:54.660  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:52:54.661  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:52:54.751  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:52:54.752  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:52:54.752 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:52:54.753 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:52:54.753  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:52:54.754  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:52:54.754  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:52:54.755  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:52:54.755  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:52:54.755  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:52:54.756 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:52:54.756 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:52:54.756 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:52:54.756 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:52:54.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:52:54.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:52:54.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:52:54.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:7a:d7:52:f0:6b:4f:a9:3d:71:2f:a2:c8:ce:fe:74:da:60:f0:11]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:55:41.579  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:55:41.580 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:55:41.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 00:55:41.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:55:41.582  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 00:55:41.583  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:55:41.583  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:55:41.584  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:55:41.584  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:55:41.588  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:55:41.588  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:55:41.589  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:55:41.589  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:55:41.694  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:55:41.694  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:55:41.695 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:55:41.696 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:55:41.696  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:55:41.696  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:55:41.697  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:55:41.697  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:55:41.698  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:55:41.698  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:55:41.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:55:41.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:55:41.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:55:41.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:55:41.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:55:41.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:55:41.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:55:41.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:59:02:18:ab:ba:1d:6e:d6:56:78:75:2e:a5:42:9d:85:59:fd:1b]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:57:29.151  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:57:29.152 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:57:29.153 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-30 00:57:29.154 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:57:29.154  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-30 00:57:29.155  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:57:29.156  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:57:29.156  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:57:29.156  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:57:29.160  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:57:29.161  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:57:29.161  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:57:29.162  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:57:29.236  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:57:29.237  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:57:29.237 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:57:29.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:57:29.239  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:57:29.239  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:57:29.240  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:57:29.240  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:57:29.241  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:57:29.241  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:57:29.241 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:57:29.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:57:29.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:57:29.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:57:29.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:57:29.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:57:29.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:57:29.246 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:f4:0e:0b:bb:1f:4a:0e:f7:62:d8:fe:d1:26:ee:29:74:41:c4:b0]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:57:40.701  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:57:40.702 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:57:40.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 00:57:40.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:57:40.704  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 00:57:40.705  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:57:40.705  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:57:40.706  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:57:40.706  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:57:40.766  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:57:40.767  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:57:40.768  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:57:40.769  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:57:40.852  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:57:40.852  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:57:40.861 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:57:40.862 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:57:40.863  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:57:40.863  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:57:40.864  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:57:40.864  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:57:40.864  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:57:40.864  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:57:40.865 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:57:40.866 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:57:40.866 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:57:40.866 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:57:40.866 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:57:40.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:57:40.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:57:40.870 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:15:9f:73:e6:93:66:15:bf:b0:af:2f:83:ae:47:83:07:60:a4:3b]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:59:15.388  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:59:15.389 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:59:15.390 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 00:59:15.390 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:59:15.391  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-30 00:59:15.391  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:59:15.391  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:59:15.391  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:59:15.392  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:59:15.396  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:59:15.396  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:59:15.396  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:59:15.397  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:59:15.488  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:59:15.489  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:59:15.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:59:15.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:59:15.490  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:59:15.490  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:59:15.491  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:59:15.491  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:59:15.492  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:59:15.492  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:59:15.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:59:15.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:59:15.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:59:15.493 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:59:15.493 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:59:15.493 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:59:15.494 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:59:15.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:b8:aa:8c:58:ec:95:f0:dd:7a:76:d1:d6:73:76:b1:55:e1:5d:fa]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 00:59:16.339  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 00:59:16.340 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 00:59:16.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 00:59:16.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 00:59:16.341  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-30 00:59:16.342  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 00:59:16.342  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 00:59:16.342  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 00:59:16.343  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 00:59:16.346  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 00:59:16.347  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:59:16.347  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 00:59:16.348  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 00:59:16.417  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 00:59:16.418  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 00:59:16.418 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 00:59:16.419 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 00:59:16.420  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 00:59:16.420  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 00:59:16.421  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 00:59:16.421  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 00:59:16.421  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 00:59:16.422  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 00:59:16.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:59:16.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:59:16.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:59:16.423 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 00:59:16.423 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 00:59:16.423 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 00:59:16.424 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 00:59:16.426 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:e7:9f:d2:fc:b4:f8:d8:19:f7:66:07:6a:96:6d:15:f4:c1:93:be]
            modulus: 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
    public exponent: 10001

] 
2021-05-30 01:00:50.062  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-30 01:00:50.063 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-30 01:00:50.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-30 01:00:50.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-30 01:00:50.065  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-30 01:00:50.065  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-30 01:00:50.065  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-30 01:00:50.066  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-30 01:00:50.066  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-30 01:00:50.070  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-30 01:00:50.070  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 01:00:50.070  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-30 01:00:50.071  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-30 01:00:50.144  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-30 01:00:50.145  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-30 01:00:50.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-30 01:00:50.146 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-30 01:00:50.147  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1140
2021-05-30 01:00:50.147  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-30 01:00:50.148  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-30 01:00:50.148  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-30 01:00:50.148  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-30 01:00:50.148  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-30 01:00:50.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 01:00:50.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 01:00:50.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 01:00:50.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-30 01:00:50.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-30 01:00:50.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-30 01:00:50.151 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-30 01:00:50.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 315217953564749409372603485251800669607892845055
             IssuerDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 29 23:04:03 UTC 2021
           Final Date: Thu May 29 23:04:03 UTC 2031
            SubjectDN: UID=c-02857c1a743b3e1a5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cb:eb:60:3b:98:cf:fd:df:f8:7b:1f:33:92:ad:a6:e0:74:2e:76:51]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a66973bcead01416a1bc587f8a7a5647848a66d5
                       fb035f16bf63df3a3216f6ae9984b62c6e9d588d
                       345c32887f985dd8fee9cc2c2d773474e930766c
                       50cadd025cc9416347f788e5b7b3a70f9629e525
                       47ee52bb35845e1fa5f244eb08035cd0e91a1539
                       d72847ab3d5af216ecae0f0b21733553fa4a38dc
                       5754213abc8d85fa7289f050b21d279c01018fff
                       c21902b40af4ab84b8799bca3e7c60c20cccda02
                       bf82e9b041338108fd8f180b080a0d6e9546db9f
                       c1897de91bab0660fa238e3411410da33d63777d
                       8410161c123242d2ec79d9a2581a7dd0c3fa2003
                       0928a07ebd004a322eb0cb9b6474b155213dba38
                       700d0a2f7840c57d5b5856a0ccb701e174366594
                       9394ee02751f52d66b0749349120d35227937801
                       ea156ee3d706d2ed46ae7599865f68bf44d3e8b3
                       0571deb7f468ec691e21e04b991e3b86569dbbea
                       bc29011f0122c766f5f8de11908638ff5fccb796
                       65973af8185dc9f994951f08154a875edbe76e79
                       27072fccc0a5ff450eff6152aadbb59104d004e9
                       996c181c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:b8:cd:44:51:87:58:d6:46:ef:c4:42:5d:cd:6a:a7:14:ff:06:e3]
            modulus: 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
    public exponent: 10001

]