Results

By type

          2021-09-24 16:36:49,910 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-24 16:36:53,600 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-24 16:36:56.192  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-24 16:37:06.799 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-24 16:37:07.801  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-24 16:37:08.405  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-24 16:37:20.712  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.586 seconds (JVM running for 38.839)
2021-09-24 17:49:03.100  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 17:49:03.109 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 17:49:03.216 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-24 17:49:03.220 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 17:49:03.296  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-24 17:49:03.299  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 17:49:03.306  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 17:49:03.306  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 17:49:03.307  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 17:49:03.397  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 17:49:03.400  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 17:49:03.510  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 17:49:03.596  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 17:49:03.597  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 17:49:03.610  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 17:49:04.807  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 17:49:04.810  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 17:49:04.892 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 17:49:04.898 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 17:49:04.899  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 17:49:04.900  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 17:49:04.902  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 17:49:04.903  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 17:49:04.992  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 17:49:04.993  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 17:49:04.994 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 17:49:04.994 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 17:49:04.995 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 17:49:05.008 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 17:49:05.008 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 17:49:05.009 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 17:49:05.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 17:49:05.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:8b:98:4c:c0:5f:78:19:a6:8a:9f:dc:7a:67:e8:1c:27:38:9e:fe]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 19:55:16.179  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 19:55:16.182 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 19:55:16.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-24 19:55:16.188 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 19:55:16.188  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-24 19:55:16.189  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 19:55:16.190  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 19:55:16.190  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 19:55:16.191  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 19:55:16.198  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 19:55:16.198  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 19:55:16.199  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 19:55:16.202  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 19:55:16.326  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 19:55:16.327  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 19:55:16.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 19:55:16.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 19:55:16.331  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 19:55:16.331  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 19:55:16.333  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 19:55:16.334  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 19:55:16.334  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 19:55:16.335  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 19:55:16.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 19:55:16.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 19:55:16.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 19:55:16.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 19:55:16.337 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 19:55:16.338 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 19:55:16.391 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 19:55:16.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: b128c0b1a371512040a953cfeb48d81af55bfd2a1cc2f433285f4d6470d09f6295597f9ea219a3fb55587d8c461b474e22700b2ce8cd368d4872b91f95de3d7598c44e4d894ecd151213653a5c32482f53af369fa8bab6641421fbb601a980ead893e96c2b24192b89284a42a9efe65bba5b16bb838d4e40b82295cb2634e0bd5574e3c685bfec701c18f415029a7d4f6a677ad35c01e308279e67509149715d95d4e4e37ce5beb39135f26a4d17e18b2b2007d961dc890023d7a626b8cdcb070b67d5627ab0f02b39689eb8c788f798aa10107b5c13dab27def8b3342a6ffd82d12a26483988d4616bf03ee81605db503cee38842331a7c389bad8125ab644cc2f840bfb9a1f95c72da346f215f926190cb1638cbdef4ce83ce9e565abd633143c129aa22d41e8b09f378858bf19a94a45df31d7d96966eae165fef1fd8b9f30c63b29f6eb0421d537ccc6b1fef7eba32cc6baa52895268556379d797457ac90bcc6ca1cefe46b484233e1063e33a214b5b63a527d2eef6d3a06da56cd769d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:99:eb:64:a2:43:c3:cc:36:9e:e7:8f:bf:71:4a:c6:91:88:10:01]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 19:56:54.231  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 19:56:54.232 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 19:56:54.233 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-24 19:56:54.234 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 19:56:54.234  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-24 19:56:54.235  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 19:56:54.235  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 19:56:54.235  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 19:56:54.236  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 19:56:54.243  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 19:56:54.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 19:56:54.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 19:56:54.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 19:56:54.405  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 19:56:54.406  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 19:56:54.406 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 19:56:54.407 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 19:56:54.408  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 19:56:54.408  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 19:56:54.409  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 19:56:54.410  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 19:56:54.410  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 19:56:54.410  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 19:56:54.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 19:56:54.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 19:56:54.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 19:56:54.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 19:56:54.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 19:56:54.413 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 19:56:54.413 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 19:56:54.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: b128c0b1a371512040a953cfeb48d81af55bfd2a1cc2f433285f4d6470d09f6295597f9ea219a3fb55587d8c461b474e22700b2ce8cd368d4872b91f95de3d7598c44e4d894ecd151213653a5c32482f53af369fa8bab6641421fbb601a980ead893e96c2b24192b89284a42a9efe65bba5b16bb838d4e40b82295cb2634e0bd5574e3c685bfec701c18f415029a7d4f6a677ad35c01e308279e67509149715d95d4e4e37ce5beb39135f26a4d17e18b2b2007d961dc890023d7a626b8cdcb070b67d5627ab0f02b39689eb8c788f798aa10107b5c13dab27def8b3342a6ffd82d12a26483988d4616bf03ee81605db503cee38842331a7c389bad8125ab644cc2f840bfb9a1f95c72da346f215f926190cb1638cbdef4ce83ce9e565abd633143c129aa22d41e8b09f378858bf19a94a45df31d7d96966eae165fef1fd8b9f30c63b29f6eb0421d537ccc6b1fef7eba32cc6baa52895268556379d797457ac90bcc6ca1cefe46b484233e1063e33a214b5b63a527d2eef6d3a06da56cd769d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:dc:fa:17:94:ef:5d:05:44:16:e8:e9:9d:95:e3:36:11:99:b7:4c]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 19:59:21.397  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 19:59:21.398 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 19:59:21.399 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-24 19:59:21.400 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 19:59:21.400  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-24 19:59:21.401  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 19:59:21.401  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 19:59:21.402  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 19:59:21.402  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 19:59:21.406  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 19:59:21.407  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 19:59:21.407  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 19:59:21.408  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 19:59:21.527  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 19:59:21.528  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 19:59:21.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 19:59:21.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 19:59:21.594  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 19:59:21.594  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 19:59:21.595  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 19:59:21.596  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 19:59:21.596  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 19:59:21.596  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 19:59:21.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 19:59:21.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 19:59:21.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 19:59:21.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 19:59:21.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 19:59:21.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 19:59:21.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 19:59:21.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: b128c0b1a371512040a953cfeb48d81af55bfd2a1cc2f433285f4d6470d09f6295597f9ea219a3fb55587d8c461b474e22700b2ce8cd368d4872b91f95de3d7598c44e4d894ecd151213653a5c32482f53af369fa8bab6641421fbb601a980ead893e96c2b24192b89284a42a9efe65bba5b16bb838d4e40b82295cb2634e0bd5574e3c685bfec701c18f415029a7d4f6a677ad35c01e308279e67509149715d95d4e4e37ce5beb39135f26a4d17e18b2b2007d961dc890023d7a626b8cdcb070b67d5627ab0f02b39689eb8c788f798aa10107b5c13dab27def8b3342a6ffd82d12a26483988d4616bf03ee81605db503cee38842331a7c389bad8125ab644cc2f840bfb9a1f95c72da346f215f926190cb1638cbdef4ce83ce9e565abd633143c129aa22d41e8b09f378858bf19a94a45df31d7d96966eae165fef1fd8b9f30c63b29f6eb0421d537ccc6b1fef7eba32cc6baa52895268556379d797457ac90bcc6ca1cefe46b484233e1063e33a214b5b63a527d2eef6d3a06da56cd769d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:32:ec:ff:a2:78:58:eb:93:b0:c5:76:a2:a5:f0:22:85:89:9a:d0]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 20:01:13.490  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:01:13.492 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:01:13.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-24 20:01:13.493 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:01:13.494  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-24 20:01:13.494  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:01:13.494  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:01:13.495  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:01:13.495  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:01:13.499  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:01:13.500  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:01:13.500  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:01:13.501  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:01:13.594  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:01:13.595  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:01:13.596 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:01:13.597 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:01:13.597  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:01:13.598  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:01:13.599  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:01:13.599  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:01:13.599  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:01:13.600  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:01:13.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:01:13.600 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:01:13.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:01:13.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:01:13.601 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:01:13.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:01:13.602 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:01:13.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:46:fa:07:12:8d:cd:ed:73:29:9e:8a:c5:9f:eb:64:f4:93:66:0d]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 20:01:53.677  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:01:53.678 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:01:53.679 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-09-24 20:01:53.680 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:01:53.680  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-09-24 20:01:53.680  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:01:53.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:01:53.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:01:53.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:01:53.686  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:01:53.686  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:01:53.686  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:01:53.687  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:01:53.766  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:01:53.766  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:01:53.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:01:53.768 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:01:53.768  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:01:53.768  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:01:53.792  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:01:53.792  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:01:53.793  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:01:53.793  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:01:53.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:01:53.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:01:53.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:01:53.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:01:53.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:01:53.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:01:53.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:01:53.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:27:9d:36:03:3d:33:31:32:e6:06:f7:8f:87:ab:25:57:44:d3:ff]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 20:03:09.650  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:03:09.651 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:03:09.652 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-24 20:03:09.652 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:03:09.652  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-24 20:03:09.653  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:03:09.653  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:03:09.654  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:03:09.654  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:03:09.658  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:03:09.659  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:03:09.659  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:03:09.660  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:03:09.800  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:03:09.801  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:03:09.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:03:09.802 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:03:09.803  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:03:09.803  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:03:09.804  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:03:09.805  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:03:09.805  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:03:09.806  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:03:09.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:03:09.806 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:03:09.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:03:09.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:03:09.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:03:09.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:03:09.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:03:09.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:2d:0c:61:75:c6:dd:e6:97:9c:ed:74:4d:fa:bb:7a:6b:56:22:41]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 20:06:28.521  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:06:28.522 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:06:28.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-24 20:06:28.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:06:28.524  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-24 20:06:28.524  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:06:28.524  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:06:28.525  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:06:28.525  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:06:28.529  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:06:28.529  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:06:28.530  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:06:28.531  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:06:28.628  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:06:28.629  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:06:28.629 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:06:28.630 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:06:28.631  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:06:28.631  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:06:28.632  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:06:28.633  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:06:28.633  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:06:28.633  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:06:28.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:06:28.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:06:28.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:06:28.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:06:28.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:06:28.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:06:28.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:06:28.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: b128c0b1a371512040a953cfeb48d81af55bfd2a1cc2f433285f4d6470d09f6295597f9ea219a3fb55587d8c461b474e22700b2ce8cd368d4872b91f95de3d7598c44e4d894ecd151213653a5c32482f53af369fa8bab6641421fbb601a980ead893e96c2b24192b89284a42a9efe65bba5b16bb838d4e40b82295cb2634e0bd5574e3c685bfec701c18f415029a7d4f6a677ad35c01e308279e67509149715d95d4e4e37ce5beb39135f26a4d17e18b2b2007d961dc890023d7a626b8cdcb070b67d5627ab0f02b39689eb8c788f798aa10107b5c13dab27def8b3342a6ffd82d12a26483988d4616bf03ee81605db503cee38842331a7c389bad8125ab644cc2f840bfb9a1f95c72da346f215f926190cb1638cbdef4ce83ce9e565abd633143c129aa22d41e8b09f378858bf19a94a45df31d7d96966eae165fef1fd8b9f30c63b29f6eb0421d537ccc6b1fef7eba32cc6baa52895268556379d797457ac90bcc6ca1cefe46b484233e1063e33a214b5b63a527d2eef6d3a06da56cd769d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:b9:b4:e3:bb:58:cd:53:ab:82:64:8a:50:22:0d:d0:f1:bb:fa:d5]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 20:09:09.902  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:09:09.903 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:09:09.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-24 20:09:09.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:09:09.905  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-09-24 20:09:09.905  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:09:09.905  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:09:09.906  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:09:09.906  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:09:09.910  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:09:09.911  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:09:09.911  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:09:09.912  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:09:09.995  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:09:09.996  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:09:09.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:09:09.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:09:09.998  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:09:09.998  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:09:09.999  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:09:10.000  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:09:10.000  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:09:10.000  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:09:10.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:09:10.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:09:10.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:09:10.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:09:10.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:09:10.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:09:10.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:09:10.005 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:80:1e:33:16:ed:a8:41:05:8b:f8:dc:6d:a0:90:73:7d:2a:52:95]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 20:09:26.263  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:09:26.263 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:09:26.264 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-24 20:09:26.265 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:09:26.265  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-24 20:09:26.265  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:09:26.266  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:09:26.266  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:09:26.266  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:09:26.271  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:09:26.271  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:09:26.272  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:09:26.273  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:09:26.352  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:09:26.352  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:09:26.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:09:26.354 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:09:26.354  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:09:26.354  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:09:26.355  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:09:26.356  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:09:26.356  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:09:26.356  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:09:26.357 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:09:26.357 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:09:26.357 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:09:26.358 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:09:26.358 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:09:26.358 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:09:26.359 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:09:26.361 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: b128c0b1a371512040a953cfeb48d81af55bfd2a1cc2f433285f4d6470d09f6295597f9ea219a3fb55587d8c461b474e22700b2ce8cd368d4872b91f95de3d7598c44e4d894ecd151213653a5c32482f53af369fa8bab6641421fbb601a980ead893e96c2b24192b89284a42a9efe65bba5b16bb838d4e40b82295cb2634e0bd5574e3c685bfec701c18f415029a7d4f6a677ad35c01e308279e67509149715d95d4e4e37ce5beb39135f26a4d17e18b2b2007d961dc890023d7a626b8cdcb070b67d5627ab0f02b39689eb8c788f798aa10107b5c13dab27def8b3342a6ffd82d12a26483988d4616bf03ee81605db503cee38842331a7c389bad8125ab644cc2f840bfb9a1f95c72da346f215f926190cb1638cbdef4ce83ce9e565abd633143c129aa22d41e8b09f378858bf19a94a45df31d7d96966eae165fef1fd8b9f30c63b29f6eb0421d537ccc6b1fef7eba32cc6baa52895268556379d797457ac90bcc6ca1cefe46b484233e1063e33a214b5b63a527d2eef6d3a06da56cd769d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2c:ee:d6:bd:0b:30:67:6b:01:52:5b:e7:eb:76:90:b9:ad:cf:2b:5a]
            modulus: 837884a93db9f4d2795f6ce6f5b29506ea549a65925daec6ee25d13c88ca65b05fcb7a3b1ab201970e04d25b11d0dfd984444865f7cc86c6444258539b074accbcdb0b597f8081d6e60fd4caeb34558147eba0d5836ec1617c0e43e6eecdaf0b824700c6bb93e55e8f8b05c85b2c2a93c02a6c39747c717a1c237d321cf00d864f1b70018b766a16ff0e38af0a1d3d9117e1c69cc1321b54931a495e686152e50bdd6157f69318da0e64154ba4bc66ee35ab915a84818f2b47e193af69d9825a2a591f1eb32c4c742eb9253af92938aa95d3d7a4769eb30c1770789f675673d86268cec6a6359d097408ffa49bee16b2cc7d93fb8975a4c2fe3346cbfe6520c9
    public exponent: 10001

] 
2021-09-24 20:12:54.666  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:12:54.666 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:12:54.667 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-09-24 20:12:54.668 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:12:54.668  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-09-24 20:12:54.668  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:12:54.669  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:12:54.669  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:12:54.669  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:12:54.673  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:12:54.674  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:12:54.674  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:12:54.675  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:12:54.788  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:12:54.788  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:12:54.789 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:12:54.790 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:12:54.790  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:12:54.790  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:12:54.791  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:12:54.791  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:12:54.792  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:12:54.792  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:12:54.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:12:54.793 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:12:54.793 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:12:54.793 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:12:54.793 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:12:54.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:12:54.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:12:54.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:be:f4:86:a0:99:26:3f:60:9e:35:57:b7:ba:8a:b8:69:7a:17:c9]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 20:13:39.883  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:13:39.884 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:13:39.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-24 20:13:39.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:13:39.885  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-24 20:13:39.886  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:13:39.886  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:13:39.886  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:13:39.887  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:13:39.890  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:13:39.891  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:13:39.891  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:13:39.892  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:13:39.976  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:13:39.976  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:13:39.977 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:13:39.978 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:13:39.978  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:13:39.979  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:13:39.980  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:13:39.980  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:13:39.980  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:13:39.980  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:13:39.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:13:39.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:13:39.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:13:39.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:13:39.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:13:39.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:13:39.983 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:13:39.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: b128c0b1a371512040a953cfeb48d81af55bfd2a1cc2f433285f4d6470d09f6295597f9ea219a3fb55587d8c461b474e22700b2ce8cd368d4872b91f95de3d7598c44e4d894ecd151213653a5c32482f53af369fa8bab6641421fbb601a980ead893e96c2b24192b89284a42a9efe65bba5b16bb838d4e40b82295cb2634e0bd5574e3c685bfec701c18f415029a7d4f6a677ad35c01e308279e67509149715d95d4e4e37ce5beb39135f26a4d17e18b2b2007d961dc890023d7a626b8cdcb070b67d5627ab0f02b39689eb8c788f798aa10107b5c13dab27def8b3342a6ffd82d12a26483988d4616bf03ee81605db503cee38842331a7c389bad8125ab644cc2f840bfb9a1f95c72da346f215f926190cb1638cbdef4ce83ce9e565abd633143c129aa22d41e8b09f378858bf19a94a45df31d7d96966eae165fef1fd8b9f30c63b29f6eb0421d537ccc6b1fef7eba32cc6baa52895268556379d797457ac90bcc6ca1cefe46b484233e1063e33a214b5b63a527d2eef6d3a06da56cd769d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:48:43:1c:ee:6f:f4:25:d3:0f:61:a0:15:33:4d:ce:88:08:9f:b7]
            modulus: af7f257231e565bad0f5bd2cf1ab0bc0e69a5c1fed6f50ca5427c5374b84b560f55347e8eac82576cab2ec0bdeee9006e1ac63e64e29088e7cf98060f24cb16e98ef284aa049977519495196eb5f02da4cb5169479dc4ef6dd48fd4d3f68da9c7b2a8c1c4e867da4054b2690be4aaf50b1c6e77c06bbb9de24591843aa0e00ae6d4034c0f60b163308f07457783c416646092dc6e4e225a3012b125e67713133d06fe092170bdfaad255b4ec2d5424a317fa979e55e00dd2443643a24da617969970763e676e555d4f37e36a5179b37750aacae8abd2b36c28f6626a6cabc382875dfd02ab8c246aaa6c3326ac1a8b61cc8190334818386a9deb35ffd612662f
    public exponent: 10001

] 
2021-09-24 20:14:04.381  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:14:04.382 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:14:04.383 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-09-24 20:14:04.383 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:14:04.384  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-09-24 20:14:04.384  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:14:04.384  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:14:04.385  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:14:04.385  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:14:04.389  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:14:04.390  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:14:04.390  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:14:04.391  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:14:04.496  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:14:04.497  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:14:04.497 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:14:04.498 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:14:04.498  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:14:04.498  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:14:04.499  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:14:04.499  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:14:04.500  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:14:04.500  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:14:04.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:14:04.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:14:04.501 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:14:04.501 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:14:04.501 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:14:04.501 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:14:04.502 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:14:04.504 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:d5:be:c3:55:e8:1c:64:3f:ac:5b:30:06:f5:5d:71:bf:6b:a0:d4]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 20:14:37.966  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:14:37.967 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:14:37.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-24 20:14:37.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:14:37.969  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-09-24 20:14:37.969  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:14:37.970  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:14:37.970  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:14:37.970  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:14:37.974  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:14:37.975  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:14:37.975  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:14:37.976  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:14:38.070  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:14:38.071  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:14:38.071 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:14:38.072 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:14:38.073  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:14:38.073  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:14:38.074  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:14:38.074  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:14:38.074  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:14:38.074  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:14:38.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:14:38.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:14:38.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:14:38.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:14:38.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:14:38.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:14:38.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:14:38.078 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ef:2c:78:16:36:95:97:7e:7f:bb:d9:a4:53:bc:a6:af:6a:70:24:e9]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 20:14:46.083  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:14:46.084 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:14:46.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-09-24 20:14:46.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:14:46.085  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-09-24 20:14:46.086  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:14:46.086  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:14:46.086  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:14:46.086  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:14:46.090  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:14:46.091  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:14:46.091  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:14:46.092  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:14:46.172  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:14:46.173  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:14:46.173 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:14:46.174 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:14:46.174  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:14:46.174  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:14:46.175  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:14:46.175  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:14:46.176  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:14:46.176  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:14:46.176 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:14:46.176 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:14:46.176 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:14:46.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:14:46.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:14:46.177 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:14:46.178 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:14:46.180 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a3:8a:aa:58:6f:d8:8c:29:a9:67:9f:5b:c3:bd:d0:41:a4:74:4b:f9]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 20:16:10.499  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:16:10.500 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:16:10.501 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-24 20:16:10.501 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:16:10.501  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-24 20:16:10.502  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:16:10.502  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:16:10.502  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:16:10.502  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:16:10.506  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:16:10.507  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:16:10.507  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:16:10.508  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:16:10.626  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:16:10.626  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:16:10.627 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:16:10.627 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:16:10.628  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:16:10.628  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:16:10.629  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:16:10.629  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:16:10.629  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:16:10.630  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:16:10.630 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:16:10.630 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:16:10.630 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:16:10.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:16:10.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:16:10.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:16:10.631 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:16:10.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:41:13:c7:32:6c:78:e6:72:54:84:6a:95:13:f9:4f:94:b8:9c:44]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 20:16:45.586  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-09-24 20:16:45.586 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 20:16:45.587 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-09-24 20:16:45.588 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 20:16:45.588  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-09-24 20:16:45.589  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-09-24 20:16:45.589  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 20:16:45.589  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 20:16:45.590  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 20:16:45.594  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 20:16:45.595  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:16:45.595  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 20:16:45.596  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 20:16:45.671  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 20:16:45.691  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-09-24 20:16:45.692 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-09-24 20:16:45.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-09-24 20:16:45.693  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1241
2021-09-24 20:16:45.694  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-09-24 20:16:45.695  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-09-24 20:16:45.695  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-09-24 20:16:45.695  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-09-24 20:16:45.696  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 20:16:45.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:16:45.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:16:45.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:16:45.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 20:16:45.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 20:16:45.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 20:16:45.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 20:16:45.701 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 469927441414313155089990755327156537907058438146
             IssuerDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 15:41:42 UTC 2021
           Final Date: Wed Sep 24 15:41:42 UTC 2031
            SubjectDN: UID=c-0cc8e0377edca80b4,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [ed:c5:3b:7c:4f:ff:cd:54:94:3f:59:13:cf:6e:11:80:5c:95:d3:0f]
            modulus: b128c0b1a371512040a953cfeb48d81af55bfd2a1cc2f433285f4d6470d09f6295597f9ea219a3fb55587d8c461b474e22700b2ce8cd368d4872b91f95de3d7598c44e4d894ecd151213653a5c32482f53af369fa8bab6641421fbb601a980ead893e96c2b24192b89284a42a9efe65bba5b16bb838d4e40b82295cb2634e0bd5574e3c685bfec701c18f415029a7d4f6a677ad35c01e308279e67509149715d95d4e4e37ce5beb39135f26a4d17e18b2b2007d961dc890023d7a626b8cdcb070b67d5627ab0f02b39689eb8c788f798aa10107b5c13dab27def8b3342a6ffd82d12a26483988d4616bf03ee81605db503cee38842331a7c389bad8125ab644cc2f840bfb9a1f95c72da346f215f926190cb1638cbdef4ce83ce9e565abd633143c129aa22d41e8b09f378858bf19a94a45df31d7d96966eae165fef1fd8b9f30c63b29f6eb0421d537ccc6b1fef7eba32cc6baa52895268556379d797457ac90bcc6ca1cefe46b484233e1063e33a214b5b63a527d2eef6d3a06da56cd769d1
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 46bad3832adb8f658084e267bc60a8dfae79a45a
                       176f66e73a8bff1c143348b9fdb4f5ee58d37216
                       b0c83fe35999db269878f00984797ddbb168b8fe
                       86c92624c9c66ae01ebf11b5a309c991228942ed
                       2849a2535a4ad7356cc0f5d55c119763fb0f3199
                       abf7f4f1af2717401822f861a798673aceb3849a
                       901f251310956c5b21ee4a0004d34ecad006b8ab
                       24da483d5cc85ed7ead3240d89e0c0012679e816
                       59b1e61d6bba7ab2b0f638c692fdaddefcde041b
                       c44918592258c747b7f65947bc0b823336e77898
                       0c55cf96256891da96e80dba887403be93ea1fc6
                       88b1de3636d9622a75f6d905526445a8e9f81e96
                       e7df6b532da8b84e8fc72892d47af46a7e614612
                       ef46a864804e375939252a5706fda925db680414
                       6f8de4213f00331e23e28acd7fed95a9180a4219
                       a5b8b71c359c0df0144ecf2ff2ea9e5c014b0b90
                       25052b180ec4867f5a1ce02d18ac0cd92ef8309e
                       5fb2415833a5dce1ced071c7bff9395b5450569d
                       add8f8ef95c3f1dd17bc2d2f2c808e07066ec590
                       4e87c748
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:1f:fc:4c:2a:44:d4:84:dd:20:74:23:5e:e4:21:5a:f2:de:62:84]
            modulus: 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
    public exponent: 10001

]