Results

By type

          2021-06-09 06:42:01,170 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-06-09 06:42:05,568 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-06-09 06:42:08.583  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-06-09 06:42:21.572 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-06-09 06:42:22.678  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-06-09 06:42:23.470  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-06-09 06:42:38.481  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 39.908 seconds (JVM running for 47.784)
2021-06-09 07:29:35.069  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:29:35.084 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:29:35.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:29:35.198 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:29:35.284  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:29:35.371  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:29:35.377  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:29:35.378  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:29:35.379  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:29:35.386  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:29:35.389  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:29:35.490  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:29:35.569  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:29:35.570  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:29:35.668  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:29:36.684  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:29:36.688  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:29:36.688 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:29:36.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:29:36.696  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:29:36.696  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:29:36.774  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:29:36.775  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:29:36.783  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:29:36.784  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:29:36.784 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:29:36.785 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:29:36.785 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:29:36.881 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:29:36.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:29:36.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:29:36.889 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:29:37.076 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: b9a885473d5d452e697db4ce25ed66ea93b43d15c28e58847ad8e6db063d4ad1329e918cf9522dddbd8ba5bd39905fa43db1a9f85e2582c68347e3dd7fff463623c0a5a451fede48f29f7acf9007a569d07fe329104303ef7a549cac380943eb81792f8bcc3dc520db8bccf36bf0882bc62b526db52d2de2f596414d7fdce13c81493478180ec9a6da392f057d2e8a24f6973c16f2bd81a899d29ec95782b2cb202b402d456ba18b40d56dd10ff6eecc705047a870d9341e4d05e26592946ad30fa554e84e5759142a9566c4e515fabe090669d6c56ba7a90c901e40ad80d038b94d4cc2d03c7bc1f983e9b9c74f7234aa4d2bbfd43f356643538d031eb62dfaed7ae053c9814ea49ed008e15ed68b68a6760bd5a4c08a1da428a772c8690721313cd7e063cfae8e1425542741575d4af0857cbd79c0ab313f384542c1a666340072357118b911397faa8fde01206e1b2c3fdc176873d6a408c8c1da0eef5d3866f571cd809ecacbb6b00748813617d32ddd4483b39cf3508af91f8796de44df
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [33:37:3a:d0:9e:16:44:31:37:af:0a:f7:f1:e3:6b:86:88:cb:a6:61]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:30:58.204  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:30:58.266 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:30:58.267 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-09 07:30:58.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:30:58.269  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-09 07:30:58.269  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:30:58.270  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:30:58.270  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:30:58.271  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:30:58.281  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:30:58.281  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:30:58.282  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:30:58.367  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:30:58.466  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:30:58.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:30:58.467 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:30:58.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:30:58.471  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:30:58.471  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:30:58.475  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:30:58.476  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:30:58.477  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:30:58.477  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:30:58.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:30:58.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:30:58.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:30:58.480 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:30:58.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:30:58.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:30:58.482 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:30:58.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:bc:71:fd:9d:cf:1d:38:fe:1f:48:fb:a1:5c:38:cf:ba:43:4a:b5]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:33:44.728  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:33:44.729 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:33:44.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-09 07:33:44.733 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:33:44.734  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-09 07:33:44.736  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:33:44.736  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:33:44.737  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:33:44.738  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:33:44.746  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:33:44.746  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:33:44.747  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:33:44.750  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:33:44.835  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:33:44.835  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:33:44.865 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:33:44.870 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:33:44.871  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:33:44.872  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:33:44.877  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:33:44.878  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:33:44.878  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:33:44.878  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:33:44.879 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:33:44.879 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:33:44.879 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:33:44.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:33:44.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:33:44.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:33:44.882 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:33:44.968 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:d8:7c:97:02:45:3b:84:59:37:87:04:c2:af:3c:2e:f6:0f:f1:1e]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:34:34.176  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:34:34.177 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:34:34.178 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-09 07:34:34.178 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:34:34.179  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-09 07:34:34.179  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:34:34.180  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:34:34.180  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:34:34.180  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:34:34.184  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:34:34.185  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:34:34.185  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:34:34.187  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:34:34.257  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:34:34.258  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:34:34.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:34:34.267 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:34:34.268  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:34:34.269  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:34:34.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:34:34.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:34:34.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:34:34.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:34:34.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:34:34.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:34:34.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:34:34.366 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:34:34.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:34:34.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:34:34.368 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:34:34.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:68:be:7f:ee:39:cd:ac:cf:a7:93:58:78:0f:fa:c7:a4:0f:82:24]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:34:48.614  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:34:48.624 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:34:48.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-09 07:34:48.627 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:34:48.627  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-09 07:34:48.666  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:34:48.667  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:34:48.667  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:34:48.670  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:34:48.682  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:34:48.698  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:34:48.699  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:34:48.701  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:34:48.774  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:34:48.782  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:34:48.783 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:34:48.787 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:34:48.791  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:34:48.791  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:34:48.793  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:34:48.794  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:34:48.794  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:34:48.795  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:34:48.795 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:34:48.795 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:34:48.796 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:34:48.796 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:34:48.865 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:34:48.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:34:48.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:34:48.871 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:ee:32:b4:46:47:c3:73:f7:0b:ef:4b:ac:87:cd:78:67:62:c0:57]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:35:20.323  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:35:20.324 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:35:20.325 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-09 07:35:20.325 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:35:20.326  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-09 07:35:20.326  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:35:20.327  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:35:20.327  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:35:20.328  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:35:20.332  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:35:20.333  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:35:20.333  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:35:20.335  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:35:20.440  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:35:20.466  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:35:20.467 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:35:20.470 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:35:20.471  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:35:20.471  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:35:20.474  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:35:20.475  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:35:20.476  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:35:20.476  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:35:20.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:35:20.482 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:35:20.483 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:35:20.485 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:35:20.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:35:20.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:35:20.487 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:35:20.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5b:d4:43:23:2c:f3:46:51:03:46:5a:ca:9e:92:fa:be:c9:ad:23:07]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:35:44.234  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:35:44.235 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:35:44.236 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-09 07:35:44.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:35:44.237  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-09 07:35:44.238  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:35:44.238  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:35:44.238  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:35:44.239  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:35:44.271  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:35:44.272  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:35:44.273  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:35:44.275  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:35:44.327  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:35:44.365  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:35:44.366 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:35:44.367 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:35:44.367  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:35:44.368  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:35:44.369  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:35:44.370  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:35:44.371  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:35:44.372  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:35:44.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:35:44.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:35:44.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:35:44.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:35:44.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:35:44.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:35:44.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:35:44.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:ad:57:78:95:fd:f2:0b:bf:eb:32:db:77:fe:eb:69:f8:16:1b:6b]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:37:07.481  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:37:07.482 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:37:07.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:37:07.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:37:07.484  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:37:07.484  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:37:07.484  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:37:07.485  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:37:07.485  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:37:07.489  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:37:07.489  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:37:07.490  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:37:07.491  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:37:07.596  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:37:07.596  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:37:07.597 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:37:07.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:37:07.600  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:37:07.600  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:37:07.604  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:37:07.666  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:37:07.667  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:37:07.668  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:37:07.669 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:37:07.669 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:37:07.669 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:37:07.670 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:37:07.671 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:37:07.671 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:37:07.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:37:07.676 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:99:5a:ac:38:a9:50:2d:16:41:0e:13:ef:2f:77:f1:74:02:fe:68]
            modulus: c394443fdf70f7ad2f50c317591721e8579800271c5c6200820ddb84808afaa0b7111d7dbb3fd5312bc48ea265d9990799cad97072852a49f2f3e2a90383c540c395bafafe98cc07808d4eb87db0e705ec60a10efaa820496f3ca58c60f5078d2bc5600728a330f5b0b1889f52b83a3268b314a131c6ff2b57fbacf7333c32b1c19231e26858bf1deb867e2ca6746f7c57eb060a9fcd4a5f5445c2e88c7f2d4ef5d0f1af8a7efdf8378a78bcdee0ef76e8e9f4941190cad3bec15707f6acb5963b8c24d9680a19c4ccc145f653c6ac3575cd0c274614ab3ba898257b0d15ba66359b588b5fc54c0c526187e629118638a0a0340bbd15dd6a82b3494d43de9a47
    public exponent: 10001

] 
2021-06-09 07:37:12.032  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:37:12.033 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:37:12.034 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-09 07:37:12.035 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:37:12.035  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-09 07:37:12.036  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:37:12.036  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:37:12.036  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:37:12.036  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:37:12.040  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:37:12.041  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:37:12.041  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:37:12.042  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:37:12.104  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:37:12.105  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:37:12.105 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:37:12.107 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:37:12.107  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:37:12.108  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:37:12.110  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:37:12.111  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:37:12.111  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:37:12.111  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:37:12.112 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:37:12.112 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:37:12.112 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:37:12.113 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:37:12.114 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:37:12.114 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:37:12.115 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:37:12.169 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:5a:56:36:40:45:8d:83:80:89:24:31:1d:5a:ba:96:b0:bd:7a:6d]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:37:37.456  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:37:37.457 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:37:37.459 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-09 07:37:37.459 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:37:37.460  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-09 07:37:37.460  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:37:37.461  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:37:37.461  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:37:37.461  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:37:37.467  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:37:37.468  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:37:37.469  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:37:37.470  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:37:37.566  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:37:37.567  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:37:37.568 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:37:37.569 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:37:37.570  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:37:37.570  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:37:37.572  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:37:37.572  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:37:37.573  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:37:37.573  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:37:37.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:37:37.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:37:37.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:37:37.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:37:37.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:37:37.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:37:37.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:37:37.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:0a:58:04:10:69:e3:8d:f0:72:6d:7d:95:a5:80:f7:65:70:b7:8c]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:42:35.224  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:42:35.226 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:42:35.228 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:42:35.229 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:42:35.229  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:42:35.229  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:42:35.230  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:42:35.230  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:42:35.230  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:42:35.235  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:42:35.235  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:42:35.236  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:42:35.267  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:42:35.363  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:42:35.365  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:42:35.366 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:42:35.367 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:42:35.368  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:42:35.368  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:42:35.371  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:42:35.371  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:42:35.372  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:42:35.372  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:42:35.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:42:35.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:42:35.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:42:35.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:42:35.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:42:35.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:42:35.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:42:35.378 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:ab:96:5c:33:af:e6:be:51:ff:15:33:00:8f:72:83:63:7f:2e:60]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:46:24.644  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:46:24.645 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:46:24.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:46:24.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:46:24.648  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:46:24.648  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:46:24.648  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:46:24.649  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:46:24.649  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:46:24.667  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:46:24.668  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:46:24.669  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:46:24.670  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:46:24.777  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:46:24.778  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:46:24.778 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:46:24.780 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:46:24.781  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:46:24.782  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:46:24.784  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:46:24.785  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:46:24.785  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:46:24.786  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:46:24.786 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:46:24.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:46:24.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:46:24.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:46:24.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:46:24.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:46:24.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:46:24.793 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: b9a885473d5d452e697db4ce25ed66ea93b43d15c28e58847ad8e6db063d4ad1329e918cf9522dddbd8ba5bd39905fa43db1a9f85e2582c68347e3dd7fff463623c0a5a451fede48f29f7acf9007a569d07fe329104303ef7a549cac380943eb81792f8bcc3dc520db8bccf36bf0882bc62b526db52d2de2f596414d7fdce13c81493478180ec9a6da392f057d2e8a24f6973c16f2bd81a899d29ec95782b2cb202b402d456ba18b40d56dd10ff6eecc705047a870d9341e4d05e26592946ad30fa554e84e5759142a9566c4e515fabe090669d6c56ba7a90c901e40ad80d038b94d4cc2d03c7bc1f983e9b9c74f7234aa4d2bbfd43f356643538d031eb62dfaed7ae053c9814ea49ed008e15ed68b68a6760bd5a4c08a1da428a772c8690721313cd7e063cfae8e1425542741575d4af0857cbd79c0ab313f384542c1a666340072357118b911397faa8fde01206e1b2c3fdc176873d6a408c8c1da0eef5d3866f571cd809ecacbb6b00748813617d32ddd4483b39cf3508af91f8796de44df
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:33:f0:04:f3:f7:e8:00:09:3d:42:5e:fa:66:42:2e:69:8f:69:e6]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:49:23.163  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:49:23.165 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:49:23.167 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:49:23.168 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:49:23.169  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:49:23.169  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:49:23.170  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:49:23.170  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:49:23.171  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:49:23.178  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:49:23.179  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:49:23.179  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:49:23.180  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:49:23.278  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:49:23.278  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:49:23.279 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:49:23.280 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:49:23.281  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:49:23.281  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:49:23.282  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:49:23.283  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:49:23.283  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:49:23.283  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:49:23.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:49:23.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:49:23.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:49:23.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:49:23.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:49:23.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:49:23.287 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:49:23.289 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:d5:55:f8:17:f8:05:ae:0a:22:63:0a:bb:d0:6e:18:23:23:25:1f]
            modulus: 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
    public exponent: 10001

] 
2021-06-09 07:51:01.773  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:51:01.774 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:51:01.776 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:51:01.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:51:01.777  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:51:01.777  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:51:01.778  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:51:01.778  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:51:01.778  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:51:01.782  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:51:01.782  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:51:01.783  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:51:01.784  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:51:01.869  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:51:01.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:51:01.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:51:01.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:51:01.872  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:51:01.872  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:51:01.874  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:51:01.874  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:51:01.875  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:51:01.875  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:51:01.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:51:01.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:51:01.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:51:01.876 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:51:01.876 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:51:01.876 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:51:01.877 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:51:01.880 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:7d:32:12:1a:b5:6d:98:2d:ec:49:25:28:33:5c:ef:db:75:0b:85]
            modulus: b6f2443f5bfad4b9465d88f850afb9da1a33e81cdc0d2d982e7bfcb547beb95b802300cc8b53b9994719bc216dbccdfc8b8deb4b9f9659aab0d9db0f7ac8cd1cff828b1f4c36a22cfe280154a06e1f19e41208ece87cff8e89fff10ed97637fa01d7a2edd9f3a58f2a698ad32cf297b21184a743e723bf7ecd2d7884894b926189e6a1f8bed46743a000131017c6419edf4577c5aaa8916ea3c341ebe1f3c92d8b9b9eba5c6f7aa4cf444b2246cf3cff5dc7e809b971cbfee088d080a9f2d11e68532e7d4c62b6048979147e262f0cfb58005e3d7ee1fa59a1fd10a1484072aaa34f327cc995569481e2f7cd59fe6d131c342641db59c6214b95adee8e1c50d7
    public exponent: 10001

] 
2021-06-09 07:56:03.831  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-09 07:56:03.832 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-09 07:56:03.833 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:56:03.834 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-09 07:56:03.834  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-09 07:56:03.835  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-09 07:56:03.835  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-09 07:56:03.835  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-09 07:56:03.836  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-09 07:56:03.840  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-09 07:56:03.841  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:56:03.841  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-09 07:56:03.842  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-09 07:56:03.922  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-09 07:56:03.923  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-09 07:56:03.923 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-09 07:56:03.924 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-09 07:56:03.924  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1972
2021-06-09 07:56:03.924  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-09 07:56:03.925  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-09 07:56:03.926  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-09 07:56:03.926  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-09 07:56:03.926  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-09 07:56:03.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:56:03.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:56:03.927 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:56:03.927 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-09 07:56:03.927 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-09 07:56:03.927 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-09 07:56:03.928 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-09 07:56:03.930 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 529864416103927560151266708061568118847692179870
             IssuerDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 08 23:07:57 UTC 2021
           Final Date: Sun Jun 08 23:07:57 UTC 2031
            SubjectDN: UID=c-084dd02c5fb51058a,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [2f:64:4e:39:28:56:81:e2:dc:cd:01:c1:8e:58:34:fa:55:4d:fc:0c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: acf227c8d7c06e31564833dbbca6d70289c15d0d
                       e089387007e3efdd048646885ce533f6167aac42
                       cfb6128e9c1d8ac2015a749b969af01afb6bd9c1
                       4f8d7e97b28b35a7811dc16e3368b6dd61be2e23
                       a754a8d6f00c7dac0100c5b11cd92a2670476eb4
                       c604e85eef64bb8e8f991b79fcca80e181b27e50
                       63d7bc833b58e59ba497aa425c69a0a01995e8d8
                       34afe81ce74236b21439c45a2362b13f847cebe5
                       82754abcba7cddf587adda32cef61f44bba09a74
                       9448375c5367921f18ec9310b1a611572434d41c
                       d844b716b1ba38dd6d87b50280642fd3325f8876
                       1bd9785ba6e7c54b67ee899f5de0fb244e75268b
                       84c41b40bc7c9473ed7e381e9224c42310e45fa2
                       150c45bf3bc4770a2581e4e1dd2b082f91272346
                       f93705105ada1a04dd59d46ebbdb1998512e5af8
                       e2a41eb192e6f6c4bfd4688b55e1f3801f056545
                       ed24a8ca6b6cbb49467a5340f8948d65de3c95ce
                       80b6c62888aa8d85fd8a4b237335f39536560082
                       36b29f8ebb4f04019877cc6f411f7cc32576b749
                       c0b5dc99
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:b0:cd:b4:01:56:6c:f9:15:d6:5f:54:a1:b7:b0:51:af:c1:21:4b]
            modulus: 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
    public exponent: 10001

]