Results

By type

          2021-04-14 04:22:56,982 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-04-14 04:23:00,885 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-04-14 04:23:03.782  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-04-14 04:23:14.990 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-04-14 04:23:15.897  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-04-14 04:23:16.584  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-04-14 04:23:30.089  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 35.201 seconds (JVM running for 41.627)
2021-04-14 04:39:56.195  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 04:39:56.285 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 04:39:56.387 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-04-14 04:39:56.474 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 04:39:56.574  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-04-14 04:39:56.577  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 04:39:56.581  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 04:39:56.581  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 04:39:56.581  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 04:39:56.587  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 04:39:56.590  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 04:39:56.786  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 04:39:56.874  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 04:39:56.875  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 04:39:56.892  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 04:39:58.113  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 04:39:58.177  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 04:39:58.177 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 04:39:58.183 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 04:39:58.185  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 04:39:58.185  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 04:39:58.188  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 04:39:58.189  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 04:39:58.276  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 04:39:58.277  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 04:39:58.278 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 04:39:58.278 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 04:39:58.279 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 04:39:58.372 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 04:39:58.372 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 04:39:58.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 04:39:58.381 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 04:39:58.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:7a:44:c1:87:29:84:8f:53:13:c0:d6:69:6b:a2:cb:1e:73:a2:1b]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:04:31.943  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:04:31.944 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:04:31.946 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:04:31.947 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:04:31.948  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:04:31.949  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:04:31.949  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:04:31.949  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:04:31.950  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:04:31.972  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:04:31.973  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:04:31.974  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:04:31.978  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:04:32.152  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:04:32.153  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:04:32.153 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:04:32.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:04:32.174  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:04:32.175  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:04:32.177  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:04:32.178  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:04:32.178  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:04:32.179  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:04:32.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:04:32.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:04:32.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:04:32.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:04:32.181 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:04:32.181 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:04:32.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:04:32.187 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [75:49:91:b4:00:f5:1a:ce:cc:fd:6b:94:f7:40:4e:ad:5f:9a:7e:bc]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:05:49.918  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:05:49.919 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:05:49.920 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-14 06:05:49.920 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:05:49.921  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-14 06:05:49.921  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:05:49.922  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:05:49.922  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:05:49.922  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:05:49.929  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:05:49.930  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:05:49.930  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:05:49.932  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:05:50.037  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:05:50.071  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:05:50.072 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:05:50.073 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:05:50.074  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:05:50.074  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:05:50.077  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:05:50.078  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:05:50.078  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:05:50.078  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:05:50.079 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:05:50.079 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:05:50.079 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:05:50.079 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:05:50.080 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:05:50.080 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:05:50.080 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:05:50.082 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 8cd20e8ae341a5f2806642be161c9c7e06a39e153e34e0e8ab0b5488c3a5573006012e966a763d392f254791a048c664cb69d37bacf93f1771c3ea1be667c2ce29f890995f39cae3a11027352082c6475e6dc6bac6551519675aafa447a8d66e2863aba2c527ab5e33e698fb619791fc9793521eb233fd14c04e3dbbb5ac56b7ad09310e0a1c421dac210f9893c643fe65691cb1157c403fab37f6f550f771fa97e19afa75f9c33a1bcd4fc0d797bd4757b09be39f8a7624e2805781f58edabaeec7743b0055c632368fc2a9ef22f16e9ba0536e4844c5c5b324624a6e478586a91bc55138dac10e939f2e4b6ec279cf467b562f6be2d94b312d85b3905b1cbfc541760e5ca22c3f6647bea7a709dbcc1b073662891b2533c7ea28c7ac656f18fd45e720a462451749b1fe9e35ba68bb8f921a188326075c5fb9b8df205105ba41ca530c4bb9ee741b756b3872f0e1a4caace50a93bc4be29f551918e449fed2a2386d77aca82e614a3cfe433e3334b553cfbad0a21d20f6cd7b454c04bd6da5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:9a:08:ee:b6:e3:5f:63:7f:c1:c0:11:68:d2:ba:a7:81:1b:57:d2]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:09:11.089  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:09:11.091 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:09:11.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-14 06:09:11.093 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:09:11.171  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-14 06:09:11.173  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:09:11.173  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:09:11.174  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:09:11.175  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:09:11.182  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:09:11.183  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:09:11.183  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:09:11.185  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:09:11.379  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:09:11.380  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:09:11.380 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:09:11.382 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:09:11.383  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:09:11.383  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:09:11.385  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:09:11.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:09:11.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:09:11.387  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:09:11.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:09:11.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:09:11.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:09:11.390 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:09:11.391 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:09:11.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:09:11.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:09:11.474 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:27:97:cd:7a:fc:b4:ed:16:5e:7e:91:ab:ec:a6:93:13:34:f1:d5]
            modulus: f5f827b35e4a01da6763bdec4f7253e324f9eab22b65c111f8f9b9d11b02c82087e5f4ba4a302a22318eaf73de05f0b4946c853c680eea70bf680cc38ddaeeea252d274e944ad675bdb32c6a3e377e8553ea7383fcbb8aaec94773a87e07276337b77252afda3ba07aa8e4e86498e58fe6f51cbd8d88141db82713eca6d1dd1ca496330e4c3db5d25f93a8cb5b9b6082c1567ad8adca33d1f128bba4ade142410f92c42c82807b19be6b81c754d0c842109a171390905c5a8b6e6a2f568050a2399536a9d77ae3e16457941287cb542c8fd4a7e19901f3be1ab66a5af6bc47ffb2db3600c9a2bc878464f4638634d050888d9cc073d3be1fe153de8f88daa92d
    public exponent: 10001

] 
2021-04-14 06:09:23.794  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:09:23.796 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:09:23.797 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-14 06:09:23.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:09:23.799  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-14 06:09:23.800  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:09:23.801  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:09:23.801  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:09:23.802  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:09:23.808  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:09:23.809  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:09:23.809  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:09:23.811  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:09:23.951  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:09:23.952  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:09:23.952 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:09:23.973 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:09:23.974  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:09:23.974  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:09:23.975  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:09:23.975  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:09:23.976  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:09:23.976  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:09:23.976 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:09:23.976 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:09:23.976 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:09:23.977 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:09:23.977 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:09:23.978 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:09:23.978 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:09:23.981 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:e5:09:d7:e1:5e:cc:99:95:26:c5:85:47:8e:6d:b9:04:b0:c3:b0]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:09:51.074  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:09:51.076 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:09:51.078 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-14 06:09:51.079 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:09:51.079  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-14 06:09:51.080  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:09:51.080  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:09:51.081  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:09:51.081  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:09:51.180  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:09:51.180  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:09:51.181  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:09:51.272  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:09:51.372  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:09:51.373  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:09:51.373 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:09:51.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:09:51.376  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:09:51.376  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:09:51.378  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:09:51.379  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:09:51.379  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:09:51.379  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:09:51.380 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:09:51.380 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:09:51.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:09:51.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:09:51.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:09:51.382 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:09:51.383 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:09:51.472 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 8cd20e8ae341a5f2806642be161c9c7e06a39e153e34e0e8ab0b5488c3a5573006012e966a763d392f254791a048c664cb69d37bacf93f1771c3ea1be667c2ce29f890995f39cae3a11027352082c6475e6dc6bac6551519675aafa447a8d66e2863aba2c527ab5e33e698fb619791fc9793521eb233fd14c04e3dbbb5ac56b7ad09310e0a1c421dac210f9893c643fe65691cb1157c403fab37f6f550f771fa97e19afa75f9c33a1bcd4fc0d797bd4757b09be39f8a7624e2805781f58edabaeec7743b0055c632368fc2a9ef22f16e9ba0536e4844c5c5b324624a6e478586a91bc55138dac10e939f2e4b6ec279cf467b562f6be2d94b312d85b3905b1cbfc541760e5ca22c3f6647bea7a709dbcc1b073662891b2533c7ea28c7ac656f18fd45e720a462451749b1fe9e35ba68bb8f921a188326075c5fb9b8df205105ba41ca530c4bb9ee741b756b3872f0e1a4caace50a93bc4be29f551918e449fed2a2386d77aca82e614a3cfe433e3334b553cfbad0a21d20f6cd7b454c04bd6da5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:6a:b1:1b:16:40:87:0b:6b:73:de:3d:cb:45:6e:4b:a9:5c:5d:2f]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:10:23.541  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:10:23.543 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:10:23.544 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-14 06:10:23.545 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:10:23.546  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-14 06:10:23.546  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:10:23.547  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:10:23.547  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:10:23.547  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:10:23.551  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:10:23.551  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:10:23.551  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:10:23.552  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:10:23.650  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:10:23.651  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:10:23.651 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:10:23.653 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:10:23.654  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:10:23.654  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:10:23.655  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:10:23.655  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:10:23.656  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:10:23.656  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:10:23.656 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:10:23.656 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:10:23.657 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:10:23.657 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:10:23.658 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:10:23.658 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:10:23.659 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:10:23.661 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 8cd20e8ae341a5f2806642be161c9c7e06a39e153e34e0e8ab0b5488c3a5573006012e966a763d392f254791a048c664cb69d37bacf93f1771c3ea1be667c2ce29f890995f39cae3a11027352082c6475e6dc6bac6551519675aafa447a8d66e2863aba2c527ab5e33e698fb619791fc9793521eb233fd14c04e3dbbb5ac56b7ad09310e0a1c421dac210f9893c643fe65691cb1157c403fab37f6f550f771fa97e19afa75f9c33a1bcd4fc0d797bd4757b09be39f8a7624e2805781f58edabaeec7743b0055c632368fc2a9ef22f16e9ba0536e4844c5c5b324624a6e478586a91bc55138dac10e939f2e4b6ec279cf467b562f6be2d94b312d85b3905b1cbfc541760e5ca22c3f6647bea7a709dbcc1b073662891b2533c7ea28c7ac656f18fd45e720a462451749b1fe9e35ba68bb8f921a188326075c5fb9b8df205105ba41ca530c4bb9ee741b756b3872f0e1a4caace50a93bc4be29f551918e449fed2a2386d77aca82e614a3cfe433e3334b553cfbad0a21d20f6cd7b454c04bd6da5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:41:6e:96:b4:60:37:75:82:b1:46:46:a0:00:78:1c:96:09:6f:8c]
            modulus: a691af0b7905d991b5102b2397ced9cb554ecfc5a583919fe2a5ea730ac79d1da8d0e7ac234a1d6c9a4117e11aac7d8bdfaacf5c7398bf1769e056a679336b7be792ddc9c0621b1971db52f4a85abc7a77c31ef172a72c41118dfdda4ebfb090ec761e0cfcf94c02d06b79e834717e758271ca673547d54a540bef34a26aedefdfda5cd93c649ceec4fbe65b014c3c4c5fb1b20f8d3251154d34b53cb7f1b6e1ae2b48cc95c1a4a0895b2fb8d0dfe8f61476b88652019e92b3551e615d85ebefdb8144081d027412727305e40f5e15cc8f02a52fa06a85c1eec2c8f4feea96a9dac174cd26296f0373ee506390e02021963df7cec10f41028944c245e6fa42d7
    public exponent: 10001

] 
2021-04-14 06:11:59.148  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:11:59.150 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:11:59.151 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-14 06:11:59.152 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:11:59.152  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-04-14 06:11:59.153  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:11:59.153  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:11:59.153  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:11:59.153  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:11:59.158  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:11:59.159  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:11:59.159  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:11:59.160  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:11:59.271  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:11:59.272  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:11:59.272 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:11:59.273 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:11:59.274  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:11:59.274  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:11:59.276  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:11:59.277  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:11:59.277  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:11:59.277  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:11:59.278 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:11:59.278 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:11:59.278 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:11:59.279 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:11:59.279 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:11:59.279 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:11:59.280 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:11:59.282 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:8c:a7:f6:b2:25:a0:14:0f:40:b2:42:d4:14:47:c0:a8:eb:3e:fd]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:16:04.260  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:16:04.261 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:16:04.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:16:04.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:16:04.262  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:16:04.263  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:16:04.263  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:16:04.263  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:16:04.264  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:16:04.268  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:16:04.269  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:16:04.269  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:16:04.270  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:16:04.358  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:16:04.359  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:16:04.359 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:16:04.360 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:16:04.361  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:16:04.361  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:16:04.362  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:16:04.363  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:16:04.363  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:16:04.364  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:16:04.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:16:04.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:16:04.365 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:16:04.365 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:16:04.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:16:04.371 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:16:04.372 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:16:04.376 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 8cd20e8ae341a5f2806642be161c9c7e06a39e153e34e0e8ab0b5488c3a5573006012e966a763d392f254791a048c664cb69d37bacf93f1771c3ea1be667c2ce29f890995f39cae3a11027352082c6475e6dc6bac6551519675aafa447a8d66e2863aba2c527ab5e33e698fb619791fc9793521eb233fd14c04e3dbbb5ac56b7ad09310e0a1c421dac210f9893c643fe65691cb1157c403fab37f6f550f771fa97e19afa75f9c33a1bcd4fc0d797bd4757b09be39f8a7624e2805781f58edabaeec7743b0055c632368fc2a9ef22f16e9ba0536e4844c5c5b324624a6e478586a91bc55138dac10e939f2e4b6ec279cf467b562f6be2d94b312d85b3905b1cbfc541760e5ca22c3f6647bea7a709dbcc1b073662891b2533c7ea28c7ac656f18fd45e720a462451749b1fe9e35ba68bb8f921a188326075c5fb9b8df205105ba41ca530c4bb9ee741b756b3872f0e1a4caace50a93bc4be29f551918e449fed2a2386d77aca82e614a3cfe433e3334b553cfbad0a21d20f6cd7b454c04bd6da5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:81:db:fc:eb:23:ba:21:e3:51:67:81:81:d3:b4:c3:04:b5:8e:a7]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:20:11.770  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:20:11.771 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:20:11.773 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-14 06:20:11.774 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:20:11.775  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-04-14 06:20:11.775  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:20:11.776  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:20:11.776  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:20:11.776  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:20:11.780  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:20:11.780  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:20:11.781  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:20:11.782  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:20:11.919  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:20:11.919  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:20:11.920 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:20:11.921 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:20:11.921  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:20:11.921  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:20:11.922  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:20:11.922  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:20:11.922  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:20:11.922  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:20:11.923 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:20:11.923 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:20:11.923 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:20:11.923 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:20:11.923 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:20:11.924 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:20:11.924 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:20:11.926 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:25:56:6c:69:53:34:25:53:09:a3:ed:39:bb:6d:ac:a9:5a:5f:eb]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:20:43.722  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:20:43.724 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:20:43.725 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-14 06:20:43.725 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:20:43.726  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-04-14 06:20:43.726  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:20:43.727  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:20:43.727  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:20:43.727  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:20:43.731  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:20:43.732  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:20:43.732  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:20:43.733  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:20:43.830  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:20:43.830  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:20:43.831 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:20:43.832 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:20:43.833  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:20:43.833  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:20:43.835  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:20:43.835  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:20:43.835  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:20:43.835  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:20:43.836 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:20:43.836 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:20:43.836 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:20:43.837 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:20:43.837 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:20:43.837 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:20:43.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:20:43.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:e2:5a:b2:40:ee:a3:7e:33:47:00:84:2c:db:1e:d8:9c:f9:ea:c1]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:21:18.207  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:21:18.209 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:21:18.210 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-14 06:21:18.211 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:21:18.211  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-04-14 06:21:18.211  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:21:18.212  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:21:18.212  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:21:18.212  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:21:18.216  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:21:18.216  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:21:18.216  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:21:18.217  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:21:18.338  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:21:18.338  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:21:18.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:21:18.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:21:18.340  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:21:18.341  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:21:18.342  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:21:18.342  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:21:18.343  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:21:18.343  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:21:18.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:21:18.343 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:21:18.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:21:18.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:21:18.344 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:21:18.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:21:18.345 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:21:18.347 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:19:4e:a3:7a:e3:3f:d8:b5:94:32:7d:e7:d6:ac:9e:2c:92:a2:fb]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:23:45.775  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:23:45.776 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:23:45.778 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-14 06:23:45.779 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:23:45.779  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-04-14 06:23:45.780  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:23:45.780  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:23:45.781  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:23:45.781  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:23:45.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:23:45.785  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:23:45.786  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:23:45.787  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:23:45.975  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:23:45.976  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:23:45.976 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:23:45.977 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:23:45.978  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:23:45.978  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:23:45.979  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:23:45.979  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:23:45.979  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:23:45.979  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:23:45.981 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:23:45.981 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:23:45.981 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:23:45.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:23:45.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:23:45.983 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:23:45.985 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:23:45.992 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:08:f9:a1:d3:09:b8:f1:47:d0:08:3a:55:70:bb:7e:9d:60:92:88]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:25:16.867  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:25:16.868 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:25:16.869 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:25:16.869 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:25:16.870  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:25:16.870  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:25:16.870  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:25:16.871  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:25:16.871  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:25:16.874  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:25:16.875  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:25:16.875  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:25:16.876  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:25:16.978  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:25:16.979  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:25:16.980 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:25:16.981 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:25:16.982  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:25:16.983  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:25:16.985  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:25:16.985  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:25:16.986  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:25:16.986  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:25:16.986 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:25:16.987 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:25:16.987 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:25:16.988 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:25:16.988 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:25:16.989 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:25:16.989 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:25:16.993 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [87:62:b4:dc:41:85:49:73:23:6f:a9:f6:bd:e0:a7:c8:8f:f4:c7:8b]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:28:16.794  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:28:16.794 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:28:16.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:28:16.796 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:28:16.796  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:28:16.796  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:28:16.796  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:28:16.797  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:28:16.797  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:28:16.801  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:28:16.802  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:28:16.802  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:28:16.803  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:28:16.902  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:28:16.902  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:28:16.903 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:28:16.904 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:28:16.905  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:28:16.905  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:28:16.906  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:28:16.907  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:28:16.907  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:28:16.907  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:28:16.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:28:16.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:28:16.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:28:16.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:28:16.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:28:16.908 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:28:16.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:28:16.976 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c0:c8:6e:c6:ff:32:8a:c5:88:65:76:f9:53:f4:ce:5f:64:45:d6:ab]
            modulus: c863698a4920364305a8c74423c2c27174871985005fb04262222f7a03d90246307eb2481fc645154483142af29a93bf048fcb61a92351305ac7ca6614c8ed6300dd92bfc8aa154d69397fe5ed50cb28abc4ac09773f6919e2f79506cffa490552fca9455955bbf10e324cb3c08b8f63f2256dcd66df0af82bb656d20ec85aa354a6c48b763b7c718c6ea221b261956ef2ed50e9efb92f5caf80575cf53c404e32b6ced5e32fa68da35ed767770ea7f4ddc584685cdd35db61beb016d474d74d024bb28b3573571eff7bf294d39e2f98d01c6a96836c29a35846d6aacef1be3c5b7d39acdc4d4ccbfd15a501b922413358fa9b007226efbaab7381ae085545b5
    public exponent: 10001

] 
2021-04-14 06:30:21.976  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:30:21.977 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:30:21.978 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:30:21.979 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:30:21.979  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:30:21.979  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:30:21.979  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:30:21.980  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:30:21.980  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:30:21.984  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:30:21.984  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:30:21.984  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:30:21.985  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:30:22.101  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:30:22.102  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:30:22.102 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:30:22.103 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:30:22.104  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:30:22.104  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:30:22.105  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:30:22.105  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:30:22.106  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:30:22.106  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:30:22.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:30:22.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:30:22.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:30:22.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:30:22.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:30:22.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:30:22.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:30:22.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:63:b5:5d:c5:96:a7:6d:9a:37:b4:b6:0e:1a:1b:0d:60:2f:10:40]
            modulus: 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
    public exponent: 10001

] 
2021-04-14 06:32:06.751  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-04-14 06:32:06.751 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-04-14 06:32:06.752 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:32:06.753 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-04-14 06:32:06.753  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-04-14 06:32:06.753  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-04-14 06:32:06.754  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-04-14 06:32:06.754  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-04-14 06:32:06.754  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-04-14 06:32:06.758  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-04-14 06:32:06.758  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:32:06.758  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-04-14 06:32:06.759  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-04-14 06:32:06.856  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-04-14 06:32:06.871  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-04-14 06:32:06.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-04-14 06:32:06.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-04-14 06:32:06.874  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1572
2021-04-14 06:32:06.875  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-04-14 06:32:06.877  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-04-14 06:32:06.877  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-04-14 06:32:06.878  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-04-14 06:32:06.879  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-04-14 06:32:06.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:32:06.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:32:06.880 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:32:06.881 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-04-14 06:32:06.881 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-04-14 06:32:06.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-04-14 06:32:06.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
2021-04-14 06:32:06.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 316041116789206400505864150665808928427350468655
             IssuerDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Apr 14 04:17:46 UTC 2021
           Final Date: Mon Apr 14 04:17:46 UTC 2031
            SubjectDN: UID=c-06a5460fcbdeb5aed,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [82:92:cd:58:10:fc:20:cb:5d:77:29:85:88:49:51:e3:f2:20:c9:9e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2fa2d919d670fc2718002dcd23f7cb701eb7ef83
                       18eff5a3cc181250e0e24042a595ef699ef0e9bb
                       18f1e84c61b0457caabfcbc926ba793a74c11ed2
                       54f95f00024be1be142f6cfa3fab852803749f58
                       19a7bf271f52c02c3b54db6597ba2f03ef7094c0
                       1cbead01b0ae71aba32dfe37aa0cc18e30623404
                       9966edad72ca2ee28c9cda3ce0a7958f9a78b5a2
                       3e3b88ed0bdeb32c5d54f4e0c553232b0c83567f
                       3ae2c8187f2ca063f5fa232752d01d753bc6bfc0
                       ae4ce8571f5eb23b2046a823811b972c5394561f
                       bf2804fa7a64539c33715240a84bac897bc18c86
                       8295885e73e4a5bfbf434cbaa7c3ab5b16437036
                       59f1e439953a33f53ba22d4b2ff43629f5ec8e5d
                       6f3769b48e08cca27e3ad6cab15ca59288999ab9
                       2ae45d460f1190634ed1eb79a69a868ea7f114e3
                       92de44917b462a3506db5f0f7f6b7b00d42b2f07
                       5be4c54762af1716ea5de8d8d945bd4889a77d5a
                       8bf439f3025d01c0b484b91b80dda3746c6117ba
                       dd9713eb132cc34ef02f3161c996431e403d2174
                       5fce36d6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:3e:66:2d:6a:e1:f0:65:c4:cc:7c:60:1e:d5:71:6f:a2:45:4a:05]
            modulus: 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
    public exponent: 10001

]