Results

By type

          2021-07-09 23:31:13,937 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-07-09 23:31:18,241 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-07-09 23:31:21.422  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-07-09 23:31:34.331 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-07-09 23:31:35.534  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-07-09 23:31:36.539  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-07-09 23:31:51.338  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 39.911 seconds (JVM running for 47.441)
2021-07-09 23:36:52.925  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-09 23:36:52.935 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-09 23:36:53.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-07-09 23:36:53.050 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-09 23:36:53.127  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-07-09 23:36:53.131  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-09 23:36:53.136  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-09 23:36:53.137  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-09 23:36:53.219  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-09 23:36:53.238  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-09 23:36:53.321  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-09 23:36:53.520  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-09 23:36:53.527  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-09 23:36:53.528  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-09 23:36:53.629  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-09 23:36:55.261  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-09 23:36:55.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-09 23:36:55.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-09 23:36:55.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-09 23:36:55.329  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-09 23:36:55.330  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-09 23:36:55.334  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-09 23:36:55.420  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-09 23:36:55.430  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-09 23:36:55.432  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-09 23:36:55.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-09 23:36:55.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-09 23:36:55.434 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-09 23:36:55.444 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-09 23:36:55.520 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-09 23:36:55.521 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-09 23:36:55.534 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-09 23:36:55.729 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:f4:20:a7:e0:0b:64:3c:94:dc:ad:15:94:d0:bc:92:1f:b8:a8:89]
            modulus: 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
    public exponent: 10001

] 
2021-07-10 01:07:00.559  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:07:00.562 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:07:00.565 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-10 01:07:00.566 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:07:00.566  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-10 01:07:00.567  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:07:00.567  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:07:00.568  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:07:00.569  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:07:00.619  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:07:00.620  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:07:00.621  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:07:00.625  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:07:00.854  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:07:00.855  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:07:00.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:07:00.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:07:00.861  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:07:00.861  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:07:00.863  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:07:00.864  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:07:00.864  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:07:00.864  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:07:00.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:07:00.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:07:00.866 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:07:00.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:07:00.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:07:00.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:07:00.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:07:00.873 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:d6:1d:54:a6:de:57:2d:7d:50:42:42:19:0e:a8:ce:c4:d3:56:12]
            modulus: 85b0eb66836f021e47ebf1e0e8eec1e9e0980d98208a5786c82b5a4d0a5f8f0fa97e53ca1284d5cd6839737dc8be3e23dfb9b20bdb140aadb476530962819c089795230c8fdf591ec08cb94f241f16323124fcc8732196565bd641343cfaf96cef48f40e918ae7c7c2cca6def5ed2308a1a3213c28e91bfce5236c1544b021ffa9ccdb53330461b6c7dd6eb5ebb103ace91cd3812b991f13dc385eaeb006ab7bad03602bbfc1888f76b1c4357135156e9c33fc4200fdca6e71182cc2a83ec68f8f9781049077c8f0c591395947e761584c43bd7d96c368f3a36062614edfb47d442443c2d6aa556f4f1f9965a837c611b1c8ef891298bc33add6384896b20c7f
    public exponent: 10001

] 
2021-07-10 01:08:39.137  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:08:39.139 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:08:39.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-07-10 01:08:39.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:08:39.142  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-07-10 01:08:39.143  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:08:39.144  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:08:39.144  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:08:39.145  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:08:39.150  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:08:39.150  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:08:39.151  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:08:39.153  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:08:39.319  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:08:39.320  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:08:39.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:08:39.323 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:08:39.325  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:08:39.325  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:08:39.329  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:08:39.330  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:08:39.331  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:08:39.331  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:08:39.332 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:08:39.332 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:08:39.332 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:08:39.333 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:08:39.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:08:39.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:08:39.335 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:08:39.337 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:38:38:ea:19:5a:49:c1:09:c0:c9:60:d4:29:41:90:c5:1f:44:22]
            modulus: be0d920eb99e3a858f8813df64573b7d28fe1951f82165ca84f1082984110112498e76b10d1fede43dc39e0d02ac5d1afc927eeef5dfd5bbb9fa9e921f22c4f4c913ea79b019d001533c5b37e222070c7fe11aa35af537b059e2c0fd116aa900fb11e78cfc897bb8ae12735e0a22e9608f52799d59a61d99d1b4aef1d84c2cce27ce0b7daf7f7308d28079f8da8e7b98289da97ddfbe8aea17015c786fdc23250a5e9894592894a96051b6c0fef49560e3278f3efcf7a2b0af2d487b407427a78ffa912a9843b4fff0eb218d078c037b7f6b9a31f6ab91965d95b64433ee5397c9d2d81fd47d180e95e72609359112950717f2078451c219aac2d04c9cc03751
    public exponent: 10001

] 
2021-07-10 01:12:29.256  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:12:29.257 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:12:29.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-10 01:12:29.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:12:29.259  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-10 01:12:29.260  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:12:29.260  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:12:29.261  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:12:29.261  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:12:29.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:12:29.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:12:29.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:12:29.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:12:29.421  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:12:29.422  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:12:29.422 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:12:29.425 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:12:29.426  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:12:29.426  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:12:29.427  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:12:29.427  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:12:29.427  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:12:29.428  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:12:29.428 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:12:29.428 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:12:29.429 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:12:29.429 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:12:29.429 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:12:29.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:12:29.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:12:29.433 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 95d48ee7de7eb19cc55e2a42dbc5a865fee0e289833ceaf61fbe47a5f3a1e10c35978c2223470bbd1699d1adcca06bd25869cb576c7341b6b12dc0af0c142422407c6f7b4d91b50d28d4ae83afb8d6be741d7f7728d46ce1b83184a50ab8b9d54e2c95876562f3e5fe6217278766fd2b7c26a4c0efe2047b0df293e7ae5f302d437aece4c0a102a55ed77a35e065cadffedadf8d1aa6180f56cdb8aee5302b30fcc314e4de7ebd939b466c012bf5e35d41d473efd765ce4c150f758a2b5904b9bb400c1dfe0bb6464f98a6962f8c351f89eeb2705621fc2d6532b939ac97aad8f30aa93373e6218946b6bc879f178d2dd3316ec646684d6a226d3c5bd65e5662743c684bd86f908ecbbaa890663b65e393d17ea1b08e440b770499641b8e421fe53aec5730312bdf3181ea920575bd2ca3d6a4a8615b1c939206c491cae6cbd72d45b7ca9df3665d636a743610464b53335b082f073b1713645411bde3894307458f8141243a3fe91f082eb520144b5eb196414c1bf3bdf446ea8d79c08c3d5b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:c4:00:cf:b5:57:3c:fb:18:24:b4:da:53:1f:72:53:84:a8:51:c4]
            modulus: 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
    public exponent: 10001

] 
2021-07-10 01:12:34.426  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:12:34.428 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:12:34.430 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-10 01:12:34.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:12:34.432  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-10 01:12:34.433  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:12:34.433  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:12:34.434  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:12:34.434  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:12:34.520  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:12:34.521  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:12:34.523  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:12:34.525  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:12:34.619  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:12:34.620  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:12:34.620 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:12:34.622 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:12:34.624  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:12:34.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:12:34.626  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:12:34.626  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:12:34.627  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:12:34.627  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:12:34.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:12:34.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:12:34.628 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:12:34.628 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:12:34.628 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:12:34.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:12:34.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:12:34.632 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 95d48ee7de7eb19cc55e2a42dbc5a865fee0e289833ceaf61fbe47a5f3a1e10c35978c2223470bbd1699d1adcca06bd25869cb576c7341b6b12dc0af0c142422407c6f7b4d91b50d28d4ae83afb8d6be741d7f7728d46ce1b83184a50ab8b9d54e2c95876562f3e5fe6217278766fd2b7c26a4c0efe2047b0df293e7ae5f302d437aece4c0a102a55ed77a35e065cadffedadf8d1aa6180f56cdb8aee5302b30fcc314e4de7ebd939b466c012bf5e35d41d473efd765ce4c150f758a2b5904b9bb400c1dfe0bb6464f98a6962f8c351f89eeb2705621fc2d6532b939ac97aad8f30aa93373e6218946b6bc879f178d2dd3316ec646684d6a226d3c5bd65e5662743c684bd86f908ecbbaa890663b65e393d17ea1b08e440b770499641b8e421fe53aec5730312bdf3181ea920575bd2ca3d6a4a8615b1c939206c491cae6cbd72d45b7ca9df3665d636a743610464b53335b082f073b1713645411bde3894307458f8141243a3fe91f082eb520144b5eb196414c1bf3bdf446ea8d79c08c3d5b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:95:62:24:0f:8f:ce:c7:08:89:98:c4:24:ab:77:b7:28:75:d3:34]
            modulus: bb328df5429424a1e7180b8570c9a2944437c3177bbc3028bcff89614a25b959f9e03114d13ec6643b57e4dddf96c20481206c98b892e4ce5331fad7e55d711b2dc99fe8bec9f1ffda4d219b254247d6ff2afffc4bda174cc5174e9f67595ce300b1f3ad2e7c91362cc54425b53858cbd81efebfc39b1ed6cbd60c3112108b6edad31ac1e9294f8abd8ab07f43b8510930994dcd93ba268ddbce132e4638a13807d33fb41381deef72d4bedd722f10816d14438c39ce7b2ca539641686253c3c5c5b244d9784980755d7b846ca3a88d6742aa7cad6dd80ca88b92702eade5257a1a19e118ce6294aea8b998803be878438eda6985470a1ce5c266882d409d8d7
    public exponent: 10001

] 
2021-07-10 01:13:29.124  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:13:29.126 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:13:29.127 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-07-10 01:13:29.128 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:13:29.128  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-07-10 01:13:29.129  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:13:29.129  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:13:29.129  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:13:29.129  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:13:29.134  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:13:29.134  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:13:29.134  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:13:29.135  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:13:29.220  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:13:29.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:13:29.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:13:29.223 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:13:29.224  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:13:29.224  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:13:29.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:13:29.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:13:29.226  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:13:29.227  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:13:29.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:13:29.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:13:29.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:13:29.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:13:29.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:13:29.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:13:29.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:13:29.232 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 95d48ee7de7eb19cc55e2a42dbc5a865fee0e289833ceaf61fbe47a5f3a1e10c35978c2223470bbd1699d1adcca06bd25869cb576c7341b6b12dc0af0c142422407c6f7b4d91b50d28d4ae83afb8d6be741d7f7728d46ce1b83184a50ab8b9d54e2c95876562f3e5fe6217278766fd2b7c26a4c0efe2047b0df293e7ae5f302d437aece4c0a102a55ed77a35e065cadffedadf8d1aa6180f56cdb8aee5302b30fcc314e4de7ebd939b466c012bf5e35d41d473efd765ce4c150f758a2b5904b9bb400c1dfe0bb6464f98a6962f8c351f89eeb2705621fc2d6532b939ac97aad8f30aa93373e6218946b6bc879f178d2dd3316ec646684d6a226d3c5bd65e5662743c684bd86f908ecbbaa890663b65e393d17ea1b08e440b770499641b8e421fe53aec5730312bdf3181ea920575bd2ca3d6a4a8615b1c939206c491cae6cbd72d45b7ca9df3665d636a743610464b53335b082f073b1713645411bde3894307458f8141243a3fe91f082eb520144b5eb196414c1bf3bdf446ea8d79c08c3d5b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d3:e7:98:94:bb:dd:39:5c:a1:24:3f:10:c6:60:09:94:4b:87:9a:d9]
            modulus: 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
    public exponent: 10001

] 
2021-07-10 01:13:46.345  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:13:46.346 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:13:46.347 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-07-10 01:13:46.347 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:13:46.347  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-07-10 01:13:46.348  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:13:46.348  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:13:46.348  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:13:46.349  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:13:46.356  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:13:46.357  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:13:46.357  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:13:46.358  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:13:46.450  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:13:46.451  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:13:46.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:13:46.452 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:13:46.453  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:13:46.453  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:13:46.454  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:13:46.455  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:13:46.455  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:13:46.455  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:13:46.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:13:46.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:13:46.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:13:46.457 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:13:46.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:13:46.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:13:46.459 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:13:46.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:53:a1:60:a1:2f:0d:7a:8a:26:bb:b6:bd:44:c9:e7:59:5f:c1:7b]
            modulus: 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
    public exponent: 10001

] 
2021-07-10 01:14:58.970  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:14:58.971 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:14:58.972 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-07-10 01:14:58.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:14:58.973  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-07-10 01:14:58.973  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:14:58.974  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:14:58.974  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:14:58.974  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:14:58.978  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:14:58.978  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:14:58.979  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:14:58.980  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:14:59.066  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:14:59.067  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:14:59.067 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:14:59.069 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:14:59.070  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:14:59.071  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:14:59.073  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:14:59.074  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:14:59.075  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:14:59.075  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:14:59.076 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:14:59.077 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:14:59.077 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:14:59.078 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:14:59.078 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:14:59.078 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:14:59.119 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:14:59.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:9f:e5:db:43:39:5f:3a:eb:74:da:02:6b:8a:b4:32:e1:72:b5:c0]
            modulus: 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
    public exponent: 10001

] 
2021-07-10 01:15:36.479  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:15:36.480 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:15:36.481 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-10 01:15:36.482 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:15:36.482  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-10 01:15:36.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:15:36.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:15:36.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:15:36.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:15:36.487  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:15:36.487  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:15:36.488  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:15:36.488  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:15:36.570  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:15:36.571  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:15:36.571 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:15:36.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:15:36.573  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:15:36.574  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:15:36.575  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:15:36.575  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:15:36.576  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:15:36.576  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:15:36.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:15:36.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:15:36.577 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:15:36.578 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:15:36.578 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:15:36.579 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:15:36.579 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:15:36.581 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 95d48ee7de7eb19cc55e2a42dbc5a865fee0e289833ceaf61fbe47a5f3a1e10c35978c2223470bbd1699d1adcca06bd25869cb576c7341b6b12dc0af0c142422407c6f7b4d91b50d28d4ae83afb8d6be741d7f7728d46ce1b83184a50ab8b9d54e2c95876562f3e5fe6217278766fd2b7c26a4c0efe2047b0df293e7ae5f302d437aece4c0a102a55ed77a35e065cadffedadf8d1aa6180f56cdb8aee5302b30fcc314e4de7ebd939b466c012bf5e35d41d473efd765ce4c150f758a2b5904b9bb400c1dfe0bb6464f98a6962f8c351f89eeb2705621fc2d6532b939ac97aad8f30aa93373e6218946b6bc879f178d2dd3316ec646684d6a226d3c5bd65e5662743c684bd86f908ecbbaa890663b65e393d17ea1b08e440b770499641b8e421fe53aec5730312bdf3181ea920575bd2ca3d6a4a8615b1c939206c491cae6cbd72d45b7ca9df3665d636a743610464b53335b082f073b1713645411bde3894307458f8141243a3fe91f082eb520144b5eb196414c1bf3bdf446ea8d79c08c3d5b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b7:95:e7:e3:61:1b:0b:ba:5d:e6:41:52:4e:81:32:a5:b6:ee:e9:d2]
            modulus: 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
    public exponent: 10001

] 
2021-07-10 01:16:33.385  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:16:33.386 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:16:33.387 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-10 01:16:33.388 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:16:33.388  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-10 01:16:33.389  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:16:33.389  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:16:33.390  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:16:33.390  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:16:33.394  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:16:33.394  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:16:33.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:16:33.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:16:33.476  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:16:33.476  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:16:33.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:16:33.479 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:16:33.480  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:16:33.480  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:16:33.482  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:16:33.482  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:16:33.482  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:16:33.483  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:16:33.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:16:33.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:16:33.483 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:16:33.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:16:33.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:16:33.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:16:33.485 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:16:33.487 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:8d:60:47:d8:89:ea:bc:20:56:b4:ec:f7:a9:2e:2c:29:b8:fb:b7]
            modulus: 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
    public exponent: 10001

] 
2021-07-10 01:20:13.295  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:20:13.297 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:20:13.298 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-10 01:20:13.299 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:20:13.299  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-10 01:20:13.299  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:20:13.300  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:20:13.300  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:20:13.300  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:20:13.305  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:20:13.305  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:20:13.306  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:20:13.307  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:20:13.431  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:20:13.432  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:20:13.432 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:20:13.434 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:20:13.434  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:20:13.435  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:20:13.436  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:20:13.436  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:20:13.436  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:20:13.437  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:20:13.437 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:20:13.437 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:20:13.438 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:20:13.438 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:20:13.438 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:20:13.439 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:20:13.439 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:20:13.443 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:d2:04:73:70:c3:4c:0d:06:f3:61:1b:3b:fa:07:15:6b:1e:e3:ec]
            modulus: 8a850bc74b214c4c6baf4706437b5e2b893240f2c1ddecc9f1ade1f1d73a684fb5d13fe352daf5b9c9a0501889e3b4e1e3e8a655e02862c61e2e6aad55de415d2e79318fe1d9d0a2dd1e12356276f625245cd347f876266045dbc764eeb1d1cecdecae4bd0d486184e27a6c528b31f15b1c0f8c6dbc6e5dcb9879b55b7a29a91464b5989785cd486b7444b4351ddc56c4520d62778bab8c289e74e473eb86a050faa237c40068eda18443a166a702efbdb543f5c122c13a9cbe71c419829b9fb636911afd1b1261de637b14ef1716bca83574c4dd83490528560bb79ec4b1ef92e6ad3d93577e5a6724cdcaa7a6f814cf2255b5b33512af68762038fa40ce635
    public exponent: 10001

] 
2021-07-10 01:21:01.649  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:21:01.650 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:21:01.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-07-10 01:21:01.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:21:01.652  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-07-10 01:21:01.652  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:21:01.652  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:21:01.653  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:21:01.653  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:21:01.658  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:21:01.658  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:21:01.658  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:21:01.659  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:21:01.749  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:21:01.750  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:21:01.750 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:21:01.753 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:21:01.754  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:21:01.819  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:21:01.820  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:21:01.821  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:21:01.821  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:21:01.821  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:21:01.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:21:01.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:21:01.822 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:21:01.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:21:01.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:21:01.823 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:21:01.824 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:21:01.827 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:8c:c9:1b:3c:0a:cf:32:3c:04:f2:9a:46:11:e2:db:68:f1:ab:8f]
            modulus: 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
    public exponent: 10001

] 
2021-07-10 01:22:25.924  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:22:25.925 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:22:25.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-10 01:22:25.927 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:22:25.927  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-10 01:22:25.928  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:22:25.928  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:22:25.929  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:22:25.929  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:22:25.934  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:22:25.935  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:22:25.935  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:22:25.936  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:22:26.095  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:22:26.096  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:22:26.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:22:26.098 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:22:26.099  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:22:26.099  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:22:26.100  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:22:26.101  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:22:26.101  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:22:26.102  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:22:26.102 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:22:26.102 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:22:26.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:22:26.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:22:26.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:22:26.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:22:26.105 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:22:26.108 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:02:ed:18:a4:31:cf:b1:8f:9c:43:b5:59:02:d3:a6:1c:46:e6:45]
            modulus: 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
    public exponent: 10001

] 
2021-07-10 01:22:42.487  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:22:42.488 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:22:42.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-10 01:22:42.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:22:42.491  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-10 01:22:42.491  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:22:42.491  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:22:42.492  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:22:42.492  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:22:42.496  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:22:42.496  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:22:42.496  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:22:42.497  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:22:42.607  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:22:42.607  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:22:42.608 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:22:42.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:22:42.610  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:22:42.610  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:22:42.611  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:22:42.612  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:22:42.612  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:22:42.612  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:22:42.613 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:22:42.613 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:22:42.613 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:22:42.613 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:22:42.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:22:42.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:22:42.615 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:22:42.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:81:fe:ae:6a:a0:b4:1c:9e:2e:ec:e9:73:c5:b3:63:12:29:38:33]
            modulus: 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
    public exponent: 10001

] 
2021-07-10 01:24:12.888  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:24:12.889 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:24:12.891 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-10 01:24:12.891 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:24:12.892  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-10 01:24:12.892  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:24:12.892  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:24:12.893  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:24:12.893  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:24:12.897  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:24:12.897  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:24:12.898  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:24:12.898  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:24:13.010  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:24:13.010  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:24:13.011 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:24:13.013 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:24:13.013  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:24:13.013  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:24:13.014  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:24:13.015  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:24:13.015  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:24:13.015  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:24:13.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:24:13.016 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:24:13.016 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:24:13.016 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:24:13.016 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:24:13.017 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:24:13.017 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:24:13.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [25:fc:ba:63:b1:b3:0f:3a:67:3f:7e:ad:08:69:3e:4c:41:59:b7:da]
            modulus: ba9d8a18fda37cf8ccbea02752bef802e057145eeb80086c1c5624f814d1f02b35ab379711a78a34b944c50a2427afa0c9a6b146dbb039dd3abe13595d806fcc89c2805518dbaaf254d9e7f88d08283d04d4c915856137d504b07aaf0ecca96ba1ce3fedfd04e371ffe13ca2a8d89389f09cfaeeb35f9eb519c94cde718450662b986c2193335da9ad540e8c40a0fe1077b5caf4b92839b16a9b02201f1f948a64e9d9e330c1f471d586abc07b77326eff68f20b238a69a53293899cc446fd6faeb8bad4debfea5d622611f14326239ee59ab01020104b54794a76912c1f2ac7f6d0f19220b2ff712bf2aa0945a1823b5e04cadf9d9a5accf879ba123e371991
    public exponent: 10001

] 
2021-07-10 01:24:29.041  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 01:24:29.042 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 01:24:29.043 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-10 01:24:29.044 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 01:24:29.044  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-10 01:24:29.045  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 01:24:29.045  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 01:24:29.045  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 01:24:29.046  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 01:24:29.049  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 01:24:29.049  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:24:29.050  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 01:24:29.050  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 01:24:29.129  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 01:24:29.129  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 01:24:29.130 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 01:24:29.131 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 01:24:29.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1003
2021-07-10 01:24:29.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 01:24:29.134  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 01:24:29.134  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 01:24:29.134  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 01:24:29.135  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 01:24:29.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:24:29.135 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:24:29.136 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:24:29.136 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 01:24:29.136 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 01:24:29.137 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 01:24:29.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 01:24:29.144 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 202469752525782011094949557881702288795846628404
             IssuerDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 09 23:22:13 UTC 2021
           Final Date: Wed Jul 09 23:22:13 UTC 2031
            SubjectDN: UID=c-051a86e1216e10861,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:89:d0:75:66:38:1c:08:d8:43:25:f3:92:72:a4:20:58:21:d3:37]
            modulus: 95d48ee7de7eb19cc55e2a42dbc5a865fee0e289833ceaf61fbe47a5f3a1e10c35978c2223470bbd1699d1adcca06bd25869cb576c7341b6b12dc0af0c142422407c6f7b4d91b50d28d4ae83afb8d6be741d7f7728d46ce1b83184a50ab8b9d54e2c95876562f3e5fe6217278766fd2b7c26a4c0efe2047b0df293e7ae5f302d437aece4c0a102a55ed77a35e065cadffedadf8d1aa6180f56cdb8aee5302b30fcc314e4de7ebd939b466c012bf5e35d41d473efd765ce4c150f758a2b5904b9bb400c1dfe0bb6464f98a6962f8c351f89eeb2705621fc2d6532b939ac97aad8f30aa93373e6218946b6bc879f178d2dd3316ec646684d6a226d3c5bd65e5662743c684bd86f908ecbbaa890663b65e393d17ea1b08e440b770499641b8e421fe53aec5730312bdf3181ea920575bd2ca3d6a4a8615b1c939206c491cae6cbd72d45b7ca9df3665d636a743610464b53335b082f073b1713645411bde3894307458f8141243a3fe91f082eb520144b5eb196414c1bf3bdf446ea8d79c08c3d5b
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 062660b2fd822d7a0afa6a451ea86f8c45d01776
                       f17033a1fdaf3a0f6db06bdf57daeca2d57c64a1
                       578f135481e0f77d813a172599bfd4cc72ce6ab1
                       d89acb85a2ce31bb4f8b9074cd9e450b8a80143b
                       d81a528c508da56addca4f3d56b8b9ed899b10e8
                       a8e1fc90d27c7b9e9fb892238b84435e22b9a2f6
                       9f1ffe90dabeb407f42dfdb3239cfff9e70502f2
                       4afd5d67a28df009f59c4e4de6c77fde0a1e04a5
                       867c68abad55c6569746258a682c0dc79ab32010
                       d8646e150fe54f5329be89c671410f17cc782df8
                       461f8dac36ab5a554862c7a8bf03a3f1d85b1e40
                       8aca02bd97e831ef5054b0de716f293cf4a78e40
                       3d797423084ebe1148e1ce1b7e33aa9a91770a7d
                       a0e84e1d71762dd53b0a42c52be7e65e5e6a8143
                       859609d044658de3e016610775bec50c86f61d5e
                       ceb3ac2aa6e27031767908c2de72e2811211b89e
                       fb4946e1aa34342638bd419790434d79bd9cd394
                       c63ea3fd5dfc0a44254c79cf321f287dea847495
                       79675116f00caadc4d9cd11a39601d0034057943
                       4525bd5d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:f6:0e:07:66:29:a1:1f:65:22:fb:4c:c2:2f:c9:65:e0:64:e0:5c]
            modulus: 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
    public exponent: 10001

]