Results

By type

          2021-07-10 23:36:51,606 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-07-10 23:36:55,512 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-07-10 23:36:58.296  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-07-10 23:37:10.817 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-07-10 23:37:12.106  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-07-10 23:37:12.822  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-07-10 23:37:27.805  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.795 seconds (JVM running for 46.671)
2021-07-10 23:48:50.413  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-10 23:48:50.501 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-10 23:48:50.623 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-07-10 23:48:50.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-10 23:48:50.801  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-07-10 23:48:50.805  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-10 23:48:50.811  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 23:48:50.811  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 23:48:50.812  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-10 23:48:50.905  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-10 23:48:50.909  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-10 23:48:51.103  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-10 23:48:51.112  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 23:48:51.113  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-10 23:48:51.204  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-10 23:48:52.613  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-10 23:48:52.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-10 23:48:52.617 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-10 23:48:52.697 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-10 23:48:52.699  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-10 23:48:52.700  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-10 23:48:52.701  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-10 23:48:52.702  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-10 23:48:52.797  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-10 23:48:52.799  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-10 23:48:52.800 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 23:48:52.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 23:48:52.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 23:48:52.897 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-10 23:48:52.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-10 23:48:52.898 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-10 23:48:52.905 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-10 23:48:53.017 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:cd:19:84:7a:c4:70:ff:94:bc:5a:20:4e:d4:70:85:25:63:9c:7d]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:04:30.870  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:04:30.871 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:04:30.872 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-11 01:04:30.873 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:04:30.874  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-11 01:04:30.875  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:04:30.875  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:04:30.876  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:04:30.877  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:04:30.902  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:04:30.904  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:04:30.904  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:04:30.907  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:04:31.047  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:04:31.048  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:04:31.048 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:04:31.100 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:04:31.105  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:04:31.106  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:04:31.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:04:31.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:04:31.110  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:04:31.111  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:04:31.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:04:31.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:04:31.112 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:04:31.196 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:04:31.197 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:04:31.197 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:04:31.199 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:04:31.204 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: a8bcc1d1e99a90a8991d834fe21c928be5deb667828f44a85ee436f5c6e606b434fea324290eb68af8dce40e701c73365ab7ab4978602a4892b052e70fc78cfa31b1eb3d5fa379fa9dadf1a544c05699dcff8937b519440b1132cbe258ea2b2cb056a0bb0caf4104b2771de9cfdd4909de814c70d1919f9f662cd0514319463766c409d30c9eda062da2a09cc614b58cfba3e2f545baadadb65f1eb0764a9843dc136506841138b8fb38d62667dfb2d37bd1cdb9b44be18c2964814865c51877734142ded2f64f404fa4fd003b4924c78927547d4bec6e16f05b19002bac7f14978045ce8969b0691b1be6ecc6d6f537d4ca3f5b87205824ac8f190e64e6ab5cf5154424a6836bded285ed3e5a66869a6c9fb38938acc8795225999bcca84091ec6d93d8fa62fec089d5215042d13e637bde55a5f1bbc671a8d3fa391612f56cf4a91250e10e51b434e374bc9273393728d20893b2de291f7fcca37e479bd99d4969f94df38b3c3710b4bbee753cf4ecca60697520f1ac8cb347b1328e257027
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:4f:08:98:1e:d9:7c:a7:a5:48:4e:03:cf:08:f8:29:be:91:41:d3]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:06:35.859  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:06:35.861 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:06:35.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-07-11 01:06:35.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:06:35.864  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-07-11 01:06:35.864  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:06:35.865  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:06:35.865  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:06:35.866  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:06:35.877  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:06:35.877  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:06:35.878  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:06:35.898  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:06:36.011  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:06:36.011  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:06:36.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:06:36.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:06:36.014  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:06:36.015  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:06:36.016  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:06:36.016  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:06:36.017  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:06:36.017  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:06:36.017 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:06:36.018 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:06:36.018 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:06:36.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:06:36.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:06:36.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:06:36.020 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:06:36.023 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:d8:bd:8b:22:42:37:81:f1:d2:c2:ba:2e:ec:98:94:c7:11:6f:f4]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:09:21.922  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:09:21.924 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:09:21.925 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-11 01:09:21.926 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:09:21.926  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-11 01:09:21.927  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:09:21.927  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:09:21.928  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:09:21.928  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:09:21.932  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:09:21.933  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:09:21.933  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:09:21.935  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:09:22.111  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:09:22.112  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:09:22.112 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:09:22.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:09:22.115  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:09:22.116  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:09:22.118  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:09:22.119  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:09:22.119  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:09:22.120  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:09:22.120 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:09:22.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:09:22.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:09:22.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:09:22.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:09:22.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:09:22.124 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:09:22.126 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:21:d6:1e:9f:55:9a:1e:a0:e8:3c:24:0a:5a:96:f9:f8:9e:74:fb]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:09:23.383  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:09:23.385 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:09:23.386 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-11 01:09:23.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:09:23.387  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-11 01:09:23.388  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:09:23.388  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:09:23.388  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:09:23.389  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:09:23.393  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:09:23.393  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:09:23.393  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:09:23.396  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:09:23.462  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:09:23.463  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:09:23.463 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:09:23.465 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:09:23.466  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:09:23.466  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:09:23.469  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:09:23.469  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:09:23.470  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:09:23.497  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:09:23.497 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:09:23.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:09:23.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:09:23.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:09:23.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:09:23.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:09:23.500 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:09:23.504 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:5d:d2:d1:0f:a0:bb:33:3e:d5:9e:12:73:d2:2b:47:f9:c3:86:33]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:10:13.054  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:10:13.055 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:10:13.056 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-07-11 01:10:13.056 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:10:13.056  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-07-11 01:10:13.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:10:13.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:10:13.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:10:13.058  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:10:13.062  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:10:13.062  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:10:13.062  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:10:13.064  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:10:13.150  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:10:13.151  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:10:13.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:10:13.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:10:13.154  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:10:13.155  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:10:13.156  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:10:13.157  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:10:13.157  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:10:13.157  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:10:13.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:10:13.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:10:13.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:10:13.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:10:13.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:10:13.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:10:13.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:10:13.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:34:90:76:48:6c:59:c9:93:8a:c3:eb:cc:77:0d:3b:fc:ca:93:25]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:10:40.487  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:10:40.489 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:10:40.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-07-11 01:10:40.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:10:40.491  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-07-11 01:10:40.492  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:10:40.492  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:10:40.492  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:10:40.493  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:10:40.498  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:10:40.499  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:10:40.499  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:10:40.500  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:10:40.563  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:10:40.564  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:10:40.564 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:10:40.566 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:10:40.596  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:10:40.597  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:10:40.599  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:10:40.599  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:10:40.600  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:10:40.600  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:10:40.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:10:40.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:10:40.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:10:40.603 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:10:40.603 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:10:40.603 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:10:40.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:10:40.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:9c:17:a5:0a:50:43:5f:b0:56:85:2e:b0:51:28:75:c8:06:eb:93]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:11:44.741  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:11:44.742 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:11:44.744 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-11 01:11:44.744 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:11:44.745  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-11 01:11:44.746  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:11:44.746  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:11:44.746  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:11:44.747  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:11:44.799  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:11:44.800  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:11:44.800  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:11:44.802  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:11:44.896  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:11:44.897  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:11:44.898 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:11:44.899 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:11:44.900  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:11:44.901  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:11:44.902  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:11:44.903  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:11:44.904  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:11:44.904  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:11:44.905 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:11:44.905 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:11:44.905 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:11:44.906 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:11:44.906 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:11:44.907 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:11:44.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:11:44.912 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:6e:f0:60:8b:f0:1f:3e:b1:65:1f:f7:63:58:2d:91:83:01:17:41]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:12:25.147  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:12:25.149 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:12:25.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-07-11 01:12:25.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:12:25.151  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-07-11 01:12:25.152  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:12:25.152  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:12:25.153  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:12:25.153  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:12:25.159  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:12:25.160  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:12:25.160  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:12:25.161  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:12:25.258  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:12:25.259  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:12:25.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:12:25.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:12:25.261  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:12:25.261  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:12:25.263  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:12:25.263  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:12:25.263  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:12:25.264  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:12:25.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:12:25.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:12:25.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:12:25.265 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:12:25.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:12:25.266 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:12:25.267 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:12:25.270 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c8:67:cc:c5:a9:6f:96:6e:5a:4e:7a:c8:29:82:9a:5e:d9:96:cc:ff]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:14:25.017  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:14:25.019 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:14:25.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-11 01:14:25.021 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:14:25.021  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-11 01:14:25.022  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:14:25.022  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:14:25.023  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:14:25.023  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:14:25.028  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:14:25.029  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:14:25.029  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:14:25.030  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:14:25.129  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:14:25.130  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:14:25.196 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:14:25.198 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:14:25.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:14:25.198  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:14:25.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:14:25.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:14:25.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:14:25.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:14:25.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:14:25.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:14:25.201 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:14:25.202 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:14:25.202 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:14:25.202 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:14:25.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:14:25.205 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8e:82:45:35:2c:4c:a4:a8:07:9b:7c:6c:86:ca:f5:74:42:66:53:5e]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:17:31.366  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:17:31.367 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:17:31.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-11 01:17:31.369 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:17:31.370  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-11 01:17:31.370  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:17:31.371  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:17:31.371  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:17:31.371  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:17:31.375  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:17:31.375  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:17:31.375  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:17:31.376  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:17:31.510  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:17:31.510  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:17:31.511 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:17:31.512 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:17:31.513  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:17:31.513  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:17:31.515  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:17:31.515  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:17:31.516  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:17:31.516  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:17:31.516 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:17:31.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:17:31.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:17:31.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:17:31.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:17:31.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:17:31.519 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:17:31.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:de:fe:53:b1:08:73:bb:2a:65:fd:3b:bb:a6:b8:db:cc:27:54:2d]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:19:31.146  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:19:31.147 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:19:31.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-11 01:19:31.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:19:31.149  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-11 01:19:31.149  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:19:31.150  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:19:31.150  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:19:31.151  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:19:31.157  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:19:31.157  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:19:31.161  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:19:31.162  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:19:31.252  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:19:31.253  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:19:31.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:19:31.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:19:31.255  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:19:31.255  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:19:31.256  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:19:31.256  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:19:31.256  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:19:31.256  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:19:31.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:19:31.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:19:31.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:19:31.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:19:31.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:19:31.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:19:31.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:19:31.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e9:73:52:a5:33:f7:1a:af:0d:8b:01:dc:e7:04:b7:64:10:dd:fc:62]
            modulus: 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
    public exponent: 10001

] 
2021-07-11 01:20:55.579  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-11 01:20:55.580 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-11 01:20:55.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-11 01:20:55.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-11 01:20:55.582  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-11 01:20:55.583  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-11 01:20:55.583  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-11 01:20:55.583  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-11 01:20:55.584  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-11 01:20:55.588  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-11 01:20:55.588  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:20:55.589  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-11 01:20:55.590  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-11 01:20:55.674  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-11 01:20:55.696  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-11 01:20:55.696 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-11 01:20:55.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-11 01:20:55.698  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1399
2021-07-11 01:20:55.698  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-11 01:20:55.699  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-11 01:20:55.699  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-11 01:20:55.699  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-11 01:20:55.700  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-11 01:20:55.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:20:55.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:20:55.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:20:55.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-11 01:20:55.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-11 01:20:55.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-11 01:20:55.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-11 01:20:55.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 631700770445447725844483177172744594644755304064
             IssuerDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 10 23:28:17 UTC 2021
           Final Date: Thu Jul 10 23:28:17 UTC 2031
            SubjectDN: UID=c-0dab5c1024d01a2d5,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [3a:e9:60:c9:f0:32:fd:ef:b0:4d:47:22:bf:9c:8a:af:00:7a:25:54]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5095d1d2c1487bbc700381d48f2bdc0d573bf500
                       c24e2a6aa49f472bb933b34b719fc2f8a47213fa
                       073a03390bc5f98b805baf0731981997b3d908d1
                       93e964c13138eeb26027529f994f2bb2e5aa7c84
                       9fd93be097ee8c13c4862ea37369f9414ddfbb00
                       acdc13255109d036683b0b6c88131b1a3e1d85df
                       cbd7c92605609c122f8579003a435e6311278719
                       2e65276a24b34e8a2dffc5446a83ef9e7ac171cf
                       fc4007f88e052ea730f3d074e5d81cac2d9719f5
                       15be17e1812494d5353904fa639bd130d762c504
                       a7077dcb48adb66cd00db704d66c94788d344a5f
                       23f6cd430b1b64bfc9267e900511bb96a2099e04
                       b091167baf6dc3a19f135f733b343835e44b9094
                       e5e2ded3049452f563d1d285a093aecdb49a15c6
                       1414ad1966fb1c113a4145fdccb10ece76ea5291
                       1bd873d37d8ae0469bf3f831f714fa2a4447818c
                       ac6370833a3430c20134855ea180c3f24742c1e7
                       991b8201408a381210fa7865e2441ad9911efa8f
                       5d113512e9ab9a83470136153447e975f021e00b
                       11dae43b
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:61:4b:67:ac:01:b2:99:03:06:84:08:1d:9e:46:76:dc:39:fb:63]
            modulus: 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
    public exponent: 10001

]