Results

By type

          2021-05-01 04:05:01,569 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-05-01 04:05:05,686 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-05-01 04:05:08.783  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-05-01 04:05:20.484 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-05-01 04:05:21.371  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-05-01 04:05:22.072  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-05-01 04:05:34.081  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 34.993 seconds (JVM running for 42.602)
2021-05-01 04:18:24.581  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 04:18:24.681 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 04:18:24.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-01 04:18:24.870 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 04:18:24.883  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-05-01 04:18:24.885  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 04:18:24.967  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 04:18:24.969  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 04:18:24.969  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 04:18:24.976  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 04:18:24.979  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 04:18:25.085  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 04:18:25.170  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 04:18:25.171  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 04:18:25.184  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 04:18:26.598  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 04:18:26.667  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 04:18:26.668 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 04:18:26.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 04:18:26.676  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 04:18:26.676  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 04:18:26.767  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 04:18:26.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 04:18:26.778  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 04:18:26.778  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 04:18:26.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 04:18:26.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 04:18:26.780 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 04:18:26.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 04:18:26.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 04:18:26.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 04:18:26.885 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 04:18:26.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:c7:59:d2:fb:00:ca:8d:68:90:ab:1b:ea:37:bf:fe:98:03:eb:38]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:21:16.739  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:21:16.741 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:21:16.743 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 06:21:16.744 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:21:16.745  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 06:21:16.747  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:21:16.748  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:21:16.767  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:21:16.767  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:21:16.774  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:21:16.775  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:21:16.775  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:21:16.780  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:21:16.972  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:21:16.973  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:21:16.973 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:21:16.976 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:21:16.977  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:21:16.977  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:21:16.981  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:21:16.982  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:21:16.982  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:21:16.982  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:21:16.983 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:21:16.983 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:21:16.983 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:21:16.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:21:16.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:21:16.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:21:16.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:21:16.989 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:41:36:d4:a1:5b:8d:db:a0:91:e1:4e:db:e8:d1:5a:89:ba:13:3e]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:22:40.345  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:22:40.346 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:22:40.347 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-01 06:22:40.348 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:22:40.348  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-05-01 06:22:40.349  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:22:40.349  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:22:40.349  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:22:40.350  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:22:40.354  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:22:40.355  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:22:40.355  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:22:40.358  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:22:40.474  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:22:40.475  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:22:40.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:22:40.479 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:22:40.480  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:22:40.480  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:22:40.484  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:22:40.485  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:22:40.486  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:22:40.486  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:22:40.487 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:22:40.487 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:22:40.487 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:22:40.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:22:40.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:22:40.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:22:40.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:22:40.492 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:e0:8d:41:79:f4:1d:87:7a:94:cb:00:ba:34:bc:a5:61:1f:8a:f7]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:25:45.157  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:25:45.158 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:25:45.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-01 06:25:45.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:25:45.160  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-01 06:25:45.161  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:25:45.161  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:25:45.161  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:25:45.162  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:25:45.168  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:25:45.169  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:25:45.169  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:25:45.170  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:25:45.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:25:45.268  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:25:45.268 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:25:45.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:25:45.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:25:45.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:25:45.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:25:45.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:25:45.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:25:45.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:25:45.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:25:45.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:25:45.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:25:45.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:25:45.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:25:45.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:25:45.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:25:45.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:07:9e:d2:2b:6b:ac:d0:5d:88:2a:57:b1:08:de:24:92:8e:56:62]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:26:03.303  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:26:03.305 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:26:03.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-01 06:26:03.307 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:26:03.307  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-05-01 06:26:03.308  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:26:03.308  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:26:03.308  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:26:03.309  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:26:03.314  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:26:03.314  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:26:03.314  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:26:03.315  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:26:03.391  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:26:03.392  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:26:03.392 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:26:03.394 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:26:03.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:26:03.396  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:26:03.399  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:26:03.399  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:26:03.466  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:26:03.467  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:26:03.467 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:26:03.467 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:26:03.467 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:26:03.467 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:26:03.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:26:03.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:26:03.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:26:03.470 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [33:c2:29:0a:a3:5c:95:7b:4b:f4:0c:d0:37:e1:9c:15:64:65:f0:8b]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:27:06.004  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:27:06.006 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:27:06.007 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-01 06:27:06.008 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:27:06.008  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-05-01 06:27:06.009  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:27:06.009  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:27:06.010  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:27:06.010  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:27:06.014  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:27:06.015  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:27:06.015  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:27:06.017  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:27:06.132  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:27:06.167  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:27:06.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:27:06.171 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:27:06.173  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:27:06.173  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:27:06.176  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:27:06.177  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:27:06.178  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:27:06.179  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:27:06.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:27:06.179 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:27:06.180 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:27:06.180 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:27:06.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:27:06.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:27:06.182 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:27:06.190 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:1b:ad:da:8b:77:8a:9f:91:5c:62:6e:4f:a4:c2:01:8a:94:63:e6]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:27:10.109  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:27:10.111 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:27:10.113 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-01 06:27:10.114 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:27:10.115  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-05-01 06:27:10.116  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:27:10.117  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:27:10.117  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:27:10.118  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:27:10.122  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:27:10.123  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:27:10.123  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:27:10.124  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:27:10.235  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:27:10.236  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:27:10.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:27:10.238 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:27:10.239  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:27:10.240  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:27:10.242  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:27:10.242  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:27:10.243  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:27:10.243  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:27:10.243 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:27:10.244 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:27:10.244 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:27:10.245 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:27:10.245 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:27:10.245 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:27:10.246 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:27:10.249 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:e5:df:88:9a:50:39:c7:cd:64:80:0b:5c:d8:e8:e8:f4:47:68:6b]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:28:02.680  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:28:02.681 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:28:02.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-01 06:28:02.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:28:02.684  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-05-01 06:28:02.686  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:28:02.686  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:28:02.686  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:28:02.686  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:28:02.773  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:28:02.774  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:28:02.775  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:28:02.778  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:28:02.947  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:28:02.966  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:28:02.967 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:28:02.968 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:28:02.969  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:28:02.969  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:28:02.971  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:28:02.972  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:28:02.972  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:28:02.973  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:28:02.973 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:28:02.973 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:28:02.973 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:28:02.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:28:02.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:28:02.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:28:02.975 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:28:02.977 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:54:1a:cb:d3:4c:d7:5b:b3:34:79:49:f9:49:de:6e:d1:c8:02:4c]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:29:39.874  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:29:39.875 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:29:39.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-01 06:29:39.878 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:29:39.878  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-05-01 06:29:39.879  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:29:39.879  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:29:39.880  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:29:39.880  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:29:39.885  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:29:39.885  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:29:39.885  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:29:39.886  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:29:39.991  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:29:39.991  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:29:39.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:29:39.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:29:39.993  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:29:39.993  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:29:39.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:29:39.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:29:39.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:29:39.996  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:29:39.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:29:39.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:29:39.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:29:39.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:29:39.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:29:39.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:29:39.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:29:40.001 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:12:aa:83:89:c6:ac:64:f5:3a:f8:44:d2:57:13:bc:d0:b6:e7:55]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:32:03.878  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:32:03.879 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:32:03.881 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 06:32:03.882 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:32:03.882  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 06:32:03.882  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:32:03.882  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:32:03.883  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:32:03.883  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:32:03.886  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:32:03.887  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:32:03.887  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:32:03.888  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:32:03.954  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:32:03.955  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:32:03.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:32:03.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:32:03.968  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:32:03.969  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:32:03.972  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:32:03.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:32:03.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:32:03.974  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:32:03.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:32:03.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:32:03.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:32:03.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:32:03.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:32:03.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:32:03.977 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:32:03.981 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:0b:ec:73:19:10:4d:53:a0:ce:d0:23:ab:37:8d:5f:71:ad:25:3c]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:35:12.775  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:35:12.776 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:35:12.778 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 06:35:12.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:35:12.779  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 06:35:12.780  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:35:12.780  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:35:12.781  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:35:12.781  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:35:12.786  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:35:12.786  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:35:12.786  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:35:12.787  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:35:12.906  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:35:12.907  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:35:12.908 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:35:12.910 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:35:12.911  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:35:12.911  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:35:12.967  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:35:12.968  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:35:12.969  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:35:12.969  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:35:12.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:35:12.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:35:12.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:35:12.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:35:12.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:35:12.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:35:12.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:35:12.974 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:b9:f0:37:64:ea:6d:3f:51:f4:d4:ea:7c:29:87:9f:a5:d3:c2:b7]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:37:09.982  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:37:09.983 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:37:09.984 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 06:37:09.984 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:37:09.984  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 06:37:09.984  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:37:09.985  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:37:09.985  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:37:09.985  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:37:09.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:37:09.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:37:09.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:37:09.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:37:10.102  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:37:10.102  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:37:10.103 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:37:10.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:37:10.106  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:37:10.106  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:37:10.109  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:37:10.109  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:37:10.109  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:37:10.110  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:37:10.110 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:37:10.110 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:37:10.110 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:37:10.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:37:10.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:37:10.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:37:10.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:37:10.116 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [47:56:19:b3:6a:39:55:13:10:f9:a5:32:e4:88:47:c8:46:2c:78:f0]
            modulus: 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
    public exponent: 10001

] 
2021-05-01 06:38:32.671  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-05-01 06:38:32.673 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-05-01 06:38:32.675 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 06:38:32.676 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-05-01 06:38:32.677  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-05-01 06:38:32.677  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-05-01 06:38:32.678  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-05-01 06:38:32.678  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-05-01 06:38:32.679  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-05-01 06:38:32.687  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-05-01 06:38:32.687  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:38:32.687  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-05-01 06:38:32.689  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-05-01 06:38:32.844  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-05-01 06:38:32.845  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-05-01 06:38:32.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-05-01 06:38:32.848 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-05-01 06:38:32.849  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-05-01 06:38:32.849  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-05-01 06:38:32.851  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-05-01 06:38:32.852  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-05-01 06:38:32.852  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-05-01 06:38:32.853  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-05-01 06:38:32.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:38:32.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:38:32.853 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:38:32.854 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-05-01 06:38:32.854 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-05-01 06:38:32.854 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-05-01 06:38:32.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
2021-05-01 06:38:32.867 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 720706924817355320679320149100696186971836091288
             IssuerDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat May 01 04:01:29 UTC 2021
           Final Date: Thu May 01 04:01:29 UTC 2031
            SubjectDN: UID=c-0ff76742611da2b92,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:50:4f:7e:f5:a1:e3:fc:dc:8d:32:e0:c5:41:f3:cc:79:a9:23:4c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 623b1c342b308daad2c59ec043c9249a798ed4ca
                       7566d3ae0203a0345641af1a655c95e954f70fa9
                       e0c75a166e366386d63b6565a6654af47e29ff3a
                       f24e40f6d9629901876e9c449630c4e618e0580d
                       187f1dc32ce39360f1d9c4e49de3ccafa2763774
                       6563914e42fbf575febba499088525380271deaf
                       c343442a8ecdfed13ba228b545e5407193598b2c
                       91ae028714c12ff2c87e353dc06420c388731959
                       df9286d55351bf2edc950e339c385bf4e682bf89
                       b21eecb95ec559b92837ed9c7ce1d0a781ddb911
                       566ca8e15badb356ad08fe6145e6871e67169379
                       89a9ff7615f23bf1aff1ddae4b7dd2d1f5aef5f8
                       d3fb8366c80ab9790d70fc4997702156b5410b86
                       881c5d063413a3db2eda13d244e51b6e18529b97
                       d872f5ab14b614318e20eb57035ad1e8a7c613d4
                       5173ffaf6da707496e0851591cbc8db8423da465
                       81a6c8820c08a387e7e31b81f7425192370fa4b7
                       3b83742b6e509827ad9a7d9be3c87ae0c1a06caa
                       a1543b96b3dec1842c8ee0595c66aad927fc56e8
                       f62a27e6
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1c:2c:79:27:62:8c:bf:88:64:07:1f:f7:b3:93:d4:3a:4e:64:d3:99]
            modulus: 97d05403e809fd80a7948acefe0a7da6ac79d36b454ae3892d53ca37a689a7ae2fc235f940a3727b7beafb2151f43b06de99cf8116b177af15ab47605b0eb635658bc33e8552475fbb920cb274ad9454de802c3975f918b46c19cdf8efe3cf957cf5d304b2448eae4396b816b65e1ba912fcd02f05f480970805e876dcdc53b6a11a08774e642c70abff834a13b34d33e589ff2f6884a0ded488e4e914a6e4f31fe199973c7518608645d27b95bddf7c5a872509ed06eb55ad3af842d76d505ed23043ccac22ac1bd733d20e0b46ca277b643d7ebc76587708d002f06b33c995dcbbd2bb7ff4318dd6268b932c2823c4b4308f49bbac1f9aef206776655aae1f
    public exponent: 10001

]