Results

By type

          2021-08-12 18:31:47,662 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-08-12 18:31:51,376 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-08-12 18:31:54.367  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-08-12 18:32:05.465 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-08-12 18:32:06.567  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-08-12 18:32:07.269  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-08-12 18:32:19.984  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 34.609 seconds (JVM running for 41.549)
2021-08-12 19:08:40.573  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 19:08:40.660 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 19:08:40.773 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-08-12 19:08:40.778 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 19:08:40.872  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-08-12 19:08:40.876  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 19:08:40.961  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 19:08:40.962  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 19:08:40.962  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 19:08:40.969  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 19:08:40.973  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 19:08:41.162  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 19:08:41.171  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 19:08:41.172  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 19:08:41.187  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 19:08:42.298  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 19:08:42.302  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 19:08:42.302 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 19:08:42.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 19:08:42.690  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 19:08:42.691  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 19:08:42.759  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 19:08:42.761  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 19:08:42.770  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 19:08:42.771  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 19:08:42.772 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 19:08:42.772 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 19:08:42.773 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 19:08:42.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 19:08:42.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 19:08:42.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 19:08:42.872 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 19:08:43.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:0c:71:a3:03:8a:ef:b1:cf:e6:ec:32:9c:6f:97:18:e5:a4:af:21]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 20:56:46.780  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 20:56:46.782 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 20:56:46.784 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 20:56:46.785 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 20:56:46.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 20:56:46.786  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 20:56:46.787  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 20:56:46.787  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 20:56:46.788  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 20:56:46.862  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 20:56:46.863  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 20:56:46.864  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 20:56:46.866  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 20:56:46.990  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 20:56:46.991  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 20:56:46.992 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 20:56:46.994 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 20:56:46.995  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 20:56:46.995  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 20:56:46.997  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 20:56:46.997  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 20:56:46.998  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 20:56:46.998  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 20:56:46.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 20:56:46.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 20:56:46.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 20:56:47.000 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 20:56:47.001 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 20:56:47.001 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 20:56:47.002 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 20:56:47.006 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c4:4e:1d:46:0d:3d:19:57:4c:f3:54:86:23:24:39:1d:ed:18:a8:96]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 20:57:55.535  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 20:57:55.536 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 20:57:55.537 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-08-12 20:57:55.538 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 20:57:55.539  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-08-12 20:57:55.539  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 20:57:55.540  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 20:57:55.540  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 20:57:55.541  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 20:57:55.546  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 20:57:55.547  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 20:57:55.547  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 20:57:55.548  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 20:57:55.645  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 20:57:55.646  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 20:57:55.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 20:57:55.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 20:57:55.662  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 20:57:55.662  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 20:57:55.668  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 20:57:55.668  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 20:57:55.668  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 20:57:55.669  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 20:57:55.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 20:57:55.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 20:57:55.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 20:57:55.671 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 20:57:55.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 20:57:55.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 20:57:55.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 20:57:55.681 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:1b:4a:3f:d4:2a:0a:0f:05:ba:c9:48:55:e3:1b:31:8c:41:69:1c]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:01:47.672  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:01:47.674 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:01:47.675 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 21:01:47.676 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:01:47.676  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 21:01:47.677  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:01:47.677  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:01:47.678  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:01:47.678  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:01:47.688  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:01:47.689  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:01:47.689  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:01:47.691  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:01:47.839  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:01:47.840  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:01:47.840 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:01:47.842 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:01:47.860  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:01:47.861  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:01:47.862  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:01:47.862  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:01:47.863  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:01:47.863  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:01:47.864 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:01:47.864 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:01:47.864 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:01:47.865 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:01:47.866 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:01:47.866 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:01:47.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:01:47.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [94:98:11:97:07:bd:3d:3e:11:08:40:ce:3b:ae:7b:f2:3a:bd:6d:5e]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:02:08.299  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:02:08.300 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:02:08.302 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 21:02:08.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:02:08.304  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 21:02:08.304  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:02:08.305  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:02:08.305  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:02:08.306  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:02:08.313  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:02:08.314  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:02:08.314  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:02:08.316  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:02:08.431  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:02:08.431  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:02:08.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:02:08.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:02:08.433  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:02:08.433  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:02:08.435  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:02:08.435  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:02:08.435  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:02:08.436  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:02:08.436 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:02:08.436 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:02:08.436 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:02:08.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:02:08.459 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:02:08.460 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:02:08.461 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:02:08.464 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:b4:80:5d:01:86:d2:e8:0b:d3:13:a4:a1:b9:35:7d:c7:4b:6f:e1]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:03:15.229  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:03:15.230 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:03:15.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-08-12 21:03:15.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:03:15.232  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-08-12 21:03:15.233  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:03:15.233  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:03:15.234  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:03:15.234  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:03:15.239  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:03:15.240  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:03:15.240  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:03:15.241  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:03:15.319  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:03:15.319  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:03:15.320 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:03:15.321 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:03:15.321  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:03:15.321  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:03:15.322  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:03:15.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:03:15.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:03:15.324  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:03:15.324 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:03:15.324 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:03:15.325 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:03:15.325 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:03:15.325 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:03:15.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:03:15.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:03:15.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:0a:f4:c4:13:05:35:0d:46:cc:e4:9a:04:d2:1b:13:17:e9:db:4c]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:03:22.738  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:03:22.739 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:03:22.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-08-12 21:03:22.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:03:22.742  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-08-12 21:03:22.743  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:03:22.743  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:03:22.744  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:03:22.744  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:03:22.751  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:03:22.751  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:03:22.752  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:03:22.754  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:03:22.877  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:03:22.878  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:03:22.878 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:03:22.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:03:22.880  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:03:22.880  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:03:22.882  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:03:22.883  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:03:22.883  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:03:22.883  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:03:22.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:03:22.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:03:22.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:03:22.886 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:03:22.886 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:03:22.886 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:03:22.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:03:22.891 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [56:e9:b2:63:3c:8d:8b:e8:57:f5:88:91:84:d0:a8:ee:fc:e1:24:c4]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:04:41.927  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:04:41.928 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:04:41.929 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-08-12 21:04:41.929 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:04:41.930  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-08-12 21:04:41.930  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:04:41.930  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:04:41.931  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:04:41.931  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:04:41.937  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:04:41.937  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:04:41.937  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:04:41.961  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:04:42.040  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:04:42.041  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:04:42.041 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:04:42.046 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:04:42.047  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:04:42.047  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:04:42.049  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:04:42.051  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:04:42.051  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:04:42.061  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:04:42.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:04:42.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:04:42.062 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:04:42.063 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:04:42.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:04:42.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:04:42.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:04:42.067 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bf:e6:b5:57:90:41:d0:09:f4:20:69:d5:75:24:22:fc:dc:0e:1a:52]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:05:53.062  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:05:53.063 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:05:53.064 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 21:05:53.064 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:05:53.065  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 21:05:53.066  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:05:53.066  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:05:53.066  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:05:53.067  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:05:53.071  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:05:53.071  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:05:53.071  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:05:53.073  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:05:53.168  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:05:53.169  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:05:53.169 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:05:53.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:05:53.175  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:05:53.175  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:05:53.176  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:05:53.176  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:05:53.177  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:05:53.177  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:05:53.178 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:05:53.178 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:05:53.178 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:05:53.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:05:53.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:05:53.179 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:05:53.180 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:05:53.183 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e9:03:82:d5:cf:7a:a9:cd:75:52:45:2d:fa:7e:92:52:d7:b0:1f:b0]
            modulus: 9327cede1ebb9f1cc07815b5af94d308b97d38b198ba9c408a6d9b96618cc458bc80780ed68a59d7ddea0e776ad94d66866057f3ce1eda40a9b9fcbbdfe1698f92f76611a2c7b1b85a4d356dfc63c7c693800fddc3d2eb6344e3f5b535dff2061a2291f095596572dc976574d42e83b5d948ae2c7205ff7c2970c72956889c05861c8ede65b2348e8608766a59d0428a961a32e8781b6f4de62e697739f1b3c5995efd21d1f7ada68ffb7120d99782c1714f33ea4b91d9ab595fdc78d824ed1f9d320e7a67f15fac28b92b4dde56762e468ced858465cdc28ecb4544fce82efd232ea52451f1766de2586439b8545e82aefd510128e3400ba75bd3263434e345
    public exponent: 10001

] 
2021-08-12 21:06:42.932  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:06:42.933 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:06:42.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 21:06:42.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:06:42.935  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 21:06:42.936  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:06:42.936  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:06:42.936  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:06:42.936  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:06:42.941  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:06:42.942  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:06:42.942  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:06:42.943  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:06:43.014  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:06:43.015  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:06:43.015 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:06:43.016 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:06:43.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:06:43.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:06:43.018  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:06:43.018  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:06:43.019  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:06:43.019  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:06:43.019 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:06:43.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:06:43.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:06:43.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:06:43.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:06:43.021 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:06:43.021 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:06:43.023 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:2d:c2:46:02:86:39:6f:1c:2f:e5:26:f5:79:f6:f5:9a:8e:48:91]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:08:35.288  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:08:35.289 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:08:35.290 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 21:08:35.291 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:08:35.291  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 21:08:35.291  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:08:35.292  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:08:35.292  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:08:35.292  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:08:35.296  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:08:35.296  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:08:35.297  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:08:35.298  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:08:35.378  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:08:35.379  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:08:35.379 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:08:35.380 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:08:35.380  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:08:35.380  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:08:35.382  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:08:35.382  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:08:35.382  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:08:35.382  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:08:35.383 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:08:35.383 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:08:35.383 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:08:35.383 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:08:35.384 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:08:35.384 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:08:35.384 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:08:35.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 90c7ef665ec9ef26d39bf35263ab88a9f318a61d64b71bdb523d9e6d45982092fab4ff861e3f3fa1f6dae65aa14060d9412dac33cc0a0eca89773a3c27e3ffa0b5c6d60632b423e11dc28f5fbd9c014b6617efdb4f2d4d0bd5b5370db708d9964e3466d4bd20876084b108eca119a5a269807d089e99747ca196b5b3a59895d2f5f1f974d9150094c8babe5a19a30c335006f1d7b382630a0ab9d54a167a74fbc7cb10509c13ae436cc84157e810aff0eceddc6c624a47b23402843ccba4f1d6aaebe817c27ae7937f3c269d97e9d27747a9b7c8e0fa8f0b3258d880dcdcd341c2faf4a10125fb6ea7829c073437f7bb0527d40a7fa62c7a3f9ca19f0abd6c0d0f13241ef73be4e249ff6e6a604a4a0e47fab839ac1785ca0ca6a708c93970ebdb2050d3fd6fd566300429a828c9ea674d15173c72dc6e0ed6b98eb85dda7cd5c066852d340fb57beebd331a890d6e71d94be60881b68397d32ab92c57422c13dee9479f07ba472bddd9f6854709aa5c9b5e7136372c5a0949a490f92e1e0bb3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5b:20:df:fe:39:c6:54:34:35:f7:3e:3f:7e:b2:7d:e4:2e:95:39:7d]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:10:26.859  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:10:26.860 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:10:26.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 21:10:26.862 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:10:26.862  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 21:10:26.862  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:10:26.863  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:10:26.863  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:10:26.863  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:10:26.867  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:10:26.868  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:10:26.868  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:10:26.869  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:10:26.973  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:10:26.974  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:10:26.974 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:10:26.975 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:10:26.976  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:10:26.976  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:10:26.977  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:10:26.978  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:10:26.978  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:10:26.978  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:10:26.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:10:26.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:10:26.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:10:26.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:10:26.982 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:10:26.983 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:10:26.983 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:10:26.986 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:b6:2e:2c:29:07:a3:cc:d2:e3:ff:4d:af:af:f4:c6:52:54:a7:47]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:10:48.823  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:10:48.824 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:10:48.825 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-08-12 21:10:48.826 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:10:48.826  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-08-12 21:10:48.827  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:10:48.827  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:10:48.827  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:10:48.828  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:10:48.832  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:10:48.833  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:10:48.833  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:10:48.834  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:10:48.905  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:10:48.905  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:10:48.905 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:10:48.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:10:48.907  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:10:48.907  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:10:48.908  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:10:48.908  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:10:48.909  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:10:48.909  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:10:48.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:10:48.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:10:48.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:10:48.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:10:48.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:10:48.910 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:10:48.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:10:48.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 90c7ef665ec9ef26d39bf35263ab88a9f318a61d64b71bdb523d9e6d45982092fab4ff861e3f3fa1f6dae65aa14060d9412dac33cc0a0eca89773a3c27e3ffa0b5c6d60632b423e11dc28f5fbd9c014b6617efdb4f2d4d0bd5b5370db708d9964e3466d4bd20876084b108eca119a5a269807d089e99747ca196b5b3a59895d2f5f1f974d9150094c8babe5a19a30c335006f1d7b382630a0ab9d54a167a74fbc7cb10509c13ae436cc84157e810aff0eceddc6c624a47b23402843ccba4f1d6aaebe817c27ae7937f3c269d97e9d27747a9b7c8e0fa8f0b3258d880dcdcd341c2faf4a10125fb6ea7829c073437f7bb0527d40a7fa62c7a3f9ca19f0abd6c0d0f13241ef73be4e249ff6e6a604a4a0e47fab839ac1785ca0ca6a708c93970ebdb2050d3fd6fd566300429a828c9ea674d15173c72dc6e0ed6b98eb85dda7cd5c066852d340fb57beebd331a890d6e71d94be60881b68397d32ab92c57422c13dee9479f07ba472bddd9f6854709aa5c9b5e7136372c5a0949a490f92e1e0bb3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:81:95:da:46:0a:89:1e:d3:58:6d:87:d9:28:7c:bd:36:4b:c8:ba]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:10:58.493  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:10:58.493 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:10:58.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 21:10:58.495 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:10:58.495  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 21:10:58.495  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:10:58.495  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:10:58.496  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:10:58.496  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:10:58.500  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:10:58.500  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:10:58.501  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:10:58.502  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:10:58.613  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:10:58.613  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:10:58.613 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:10:58.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:10:58.615  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:10:58.615  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:10:58.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:10:58.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:10:58.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:10:58.618  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:10:58.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:10:58.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:10:58.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:10:58.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:10:58.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:10:58.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:10:58.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:10:58.623 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 90c7ef665ec9ef26d39bf35263ab88a9f318a61d64b71bdb523d9e6d45982092fab4ff861e3f3fa1f6dae65aa14060d9412dac33cc0a0eca89773a3c27e3ffa0b5c6d60632b423e11dc28f5fbd9c014b6617efdb4f2d4d0bd5b5370db708d9964e3466d4bd20876084b108eca119a5a269807d089e99747ca196b5b3a59895d2f5f1f974d9150094c8babe5a19a30c335006f1d7b382630a0ab9d54a167a74fbc7cb10509c13ae436cc84157e810aff0eceddc6c624a47b23402843ccba4f1d6aaebe817c27ae7937f3c269d97e9d27747a9b7c8e0fa8f0b3258d880dcdcd341c2faf4a10125fb6ea7829c073437f7bb0527d40a7fa62c7a3f9ca19f0abd6c0d0f13241ef73be4e249ff6e6a604a4a0e47fab839ac1785ca0ca6a708c93970ebdb2050d3fd6fd566300429a828c9ea674d15173c72dc6e0ed6b98eb85dda7cd5c066852d340fb57beebd331a890d6e71d94be60881b68397d32ab92c57422c13dee9479f07ba472bddd9f6854709aa5c9b5e7136372c5a0949a490f92e1e0bb3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:80:b9:8b:ec:95:85:46:87:e3:fc:d0:9e:fd:cc:f0:a6:99:47:78]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:12:04.489  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:12:04.490 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:12:04.491 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 21:12:04.492 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:12:04.492  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 21:12:04.493  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:12:04.493  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:12:04.493  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:12:04.494  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:12:04.498  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:12:04.498  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:12:04.498  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:12:04.500  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:12:04.602  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:12:04.603  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:12:04.603 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:12:04.604 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:12:04.604  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:12:04.605  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:12:04.606  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:12:04.606  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:12:04.606  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:12:04.606  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:12:04.607 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:12:04.607 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:12:04.607 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:12:04.607 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:12:04.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:12:04.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:12:04.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:12:04.611 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [88:12:4a:50:f4:36:e1:60:88:6a:ca:f7:14:83:1f:4a:ae:7c:e3:42]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:12:05.675  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:12:05.675 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:12:05.676 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 21:12:05.677 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:12:05.677  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-08-12 21:12:05.677  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:12:05.678  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:12:05.678  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:12:05.678  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:12:05.682  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:12:05.682  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:12:05.682  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:12:05.683  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:12:05.750  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:12:05.750  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:12:05.750 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:12:05.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:12:05.753  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:12:05.753  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:12:05.755  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:12:05.755  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:12:05.756  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:12:05.756  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:12:05.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:12:05.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:12:05.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:12:05.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:12:05.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:12:05.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:12:05.758 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:12:05.760 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:df:2b:8d:65:1c:45:32:7c:dc:b4:3d:7a:08:66:4b:37:30:63:f4]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:15:34.800  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:15:34.801 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:15:34.802 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-08-12 21:15:34.802 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:15:34.803  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-08-12 21:15:34.803  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:15:34.803  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:15:34.804  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:15:34.804  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:15:34.809  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:15:34.809  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:15:34.809  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:15:34.811  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:15:34.896  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:15:34.897  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:15:34.897 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:15:34.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:15:34.898  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:15:34.898  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:15:34.900  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:15:34.900  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:15:34.900  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:15:34.900  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:15:34.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:15:34.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:15:34.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:15:34.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:15:34.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:15:34.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:15:34.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:15:34.905 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 90c7ef665ec9ef26d39bf35263ab88a9f318a61d64b71bdb523d9e6d45982092fab4ff861e3f3fa1f6dae65aa14060d9412dac33cc0a0eca89773a3c27e3ffa0b5c6d60632b423e11dc28f5fbd9c014b6617efdb4f2d4d0bd5b5370db708d9964e3466d4bd20876084b108eca119a5a269807d089e99747ca196b5b3a59895d2f5f1f974d9150094c8babe5a19a30c335006f1d7b382630a0ab9d54a167a74fbc7cb10509c13ae436cc84157e810aff0eceddc6c624a47b23402843ccba4f1d6aaebe817c27ae7937f3c269d97e9d27747a9b7c8e0fa8f0b3258d880dcdcd341c2faf4a10125fb6ea7829c073437f7bb0527d40a7fa62c7a3f9ca19f0abd6c0d0f13241ef73be4e249ff6e6a604a4a0e47fab839ac1785ca0ca6a708c93970ebdb2050d3fd6fd566300429a828c9ea674d15173c72dc6e0ed6b98eb85dda7cd5c066852d340fb57beebd331a890d6e71d94be60881b68397d32ab92c57422c13dee9479f07ba472bddd9f6854709aa5c9b5e7136372c5a0949a490f92e1e0bb3
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:08:08:d7:66:35:65:84:9c:8f:f3:8d:e9:8a:48:11:93:2a:e6:61]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:16:49.609  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:16:49.610 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:16:49.611 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 21:16:49.611 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:16:49.611  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-08-12 21:16:49.612  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:16:49.612  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:16:49.612  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:16:49.613  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:16:49.616  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:16:49.617  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:16:49.617  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:16:49.618  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:16:49.694  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:16:49.694  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:16:49.694 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:16:49.696 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:16:49.696  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:16:49.697  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:16:49.698  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:16:49.698  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:16:49.699  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:16:49.699  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:16:49.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:16:49.700 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:16:49.700 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:16:49.700 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:16:49.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:16:49.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:16:49.702 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:16:49.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:1b:89:a4:15:e4:84:b8:f5:5f:95:61:71:f3:17:bc:90:2c:c8:d9]
            modulus: 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
    public exponent: 10001

] 
2021-08-12 21:18:19.972  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-08-12 21:18:19.973 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-08-12 21:18:19.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 21:18:19.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-08-12 21:18:19.975  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-08-12 21:18:19.975  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-08-12 21:18:19.976  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-08-12 21:18:19.976  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-08-12 21:18:19.976  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-08-12 21:18:19.980  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-08-12 21:18:19.980  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:18:19.981  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-08-12 21:18:19.982  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-08-12 21:18:20.058  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-08-12 21:18:20.059  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-08-12 21:18:20.059 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-08-12 21:18:20.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-08-12 21:18:20.061  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1701
2021-08-12 21:18:20.061  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-08-12 21:18:20.062  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-08-12 21:18:20.062  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-08-12 21:18:20.063  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-08-12 21:18:20.063  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-08-12 21:18:20.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:18:20.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:18:20.064 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:18:20.064 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-08-12 21:18:20.064 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-08-12 21:18:20.065 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-08-12 21:18:20.065 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
2021-08-12 21:18:20.067 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 210214864329192059879029704268906704734317142211
             IssuerDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Aug 12 18:27:17 UTC 2021
           Final Date: Tue Aug 12 18:27:17 UTC 2031
            SubjectDN: UID=c-0f0f60a2e9c002892,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [24:60:cb:9c:a7:99:47:7a:3c:65:7b:a0:df:51:44:d7:32:cc:e5:6f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 241b7cc896085ecd83861db81845f648da6dc9a9
                       6bfb6b24b1ff3adf2309c835afd7e1dbe3c82a37
                       30bddbd8ddab3fa31d29d8533a1e6e4bb8504eef
                       9b78870c8722a3f71e91affb1eb4b552f734fcbe
                       213a7b056f7b64a341a68854700e03ae6d8b68a9
                       4b75e41db4aa51f799f9a5cd356f9f5c2d76895d
                       08ca6a71c9d4d46081147c7313f5d3de837d7118
                       5fa8e61cafbc2242ff619cd6b1909ba419b52b9d
                       76d441439558dbea5472460c131317f89972acb0
                       e4330d3a56d91ff780d22715c127748a3d83de84
                       3bdf14069792d9be21fd51c9b3c99eb1c313c601
                       120e5e8096763414b48a26ff01de7bc7b0c35508
                       67af5a75efa8ca7a829858e3e0abe23c19464ff0
                       279d995eea5363fb3c0747df6557637e29fbddf3
                       66f2d512ba486a7c589b26f0d1d7e1fcdca9ab7e
                       d5745b85a423978f704fd3ec2c1fba6bebc194bd
                       3506a696abbb49140bbe077596534ce2b70f5150
                       4c83a2ae3009661628eea8f9bee54bff83deae44
                       a8373b213d77475f66278ed8fa2de933603f44ca
                       dce07f95
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:6a:ca:ee:fe:a2:8f:86:1f:17:59:a0:e8:96:0d:08:f0:a2:28:2a]
            modulus: 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
    public exponent: 10001

]