Results

By type

          2021-06-05 07:26:01,310 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-06-05 07:26:05,513 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-06-05 07:26:08.698  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-06-05 07:26:21.220 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-06-05 07:26:22.625  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-06-05 07:26:23.411  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-06-05 07:26:37.998  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 39.2 seconds (JVM running for 46.893)
2021-06-05 07:45:22.008  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 07:45:22.099 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 07:45:22.198 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-05 07:45:22.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 07:45:22.295  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-05 07:45:22.299  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 07:45:22.304  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 07:45:22.305  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 07:45:22.305  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 07:45:22.314  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 07:45:22.400  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 07:45:22.513  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 07:45:22.518  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 07:45:22.595  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 07:45:22.702  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 07:45:24.196  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 07:45:24.201  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 07:45:24.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 07:45:24.208 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 07:45:24.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 07:45:24.210  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 07:45:24.296  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 07:45:24.297  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 07:45:24.305  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 07:45:24.306  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 07:45:24.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 07:45:24.308 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 07:45:24.308 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 07:45:24.404 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 07:45:24.405 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 07:45:24.405 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 07:45:24.413 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 07:45:24.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:53:d5:8a:e9:f6:51:23:a9:1c:71:d5:56:2a:d4:cb:e5:4c:e6:fa]
            modulus: e6b3c98e71bbf64f8ac44d918911748cec22883bf242871e61e37605755e20ab030d465e0388e90f1fce660447e634279bb8fc31fa0d6f893112bcb4bfc04260df7db7db579c7c0ad8142cd2ee78c90ffb99e741bae8c60d023c44cf2d1e0c2043e10a84bafdea75b81e0b7c8da38f2dc929e380c8d128efdebde10a8a89e1e3e06ed37da0ebee5f4f44cb84e8ff0e2eacc9912177b96e6c64c5e69188ea3bd2adecbb89892b034d6d5d8203bf81499c8d38c3e17044939b7e7ec0699c9cea2242e25703a6e5638830b290ecdceaea2fa2f848bf8ef7b4756e9853cc3bb755815dcea5217495f5c880aa60c079963001dafdcc4c7c4e0dc752cd654d2ae7ad1f
    public exponent: 10001

] 
2021-06-05 09:08:45.489  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:08:45.490 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:08:45.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 09:08:45.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:08:45.493  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 09:08:45.494  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:08:45.495  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:08:45.495  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:08:45.496  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:08:45.504  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:08:45.505  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:08:45.506  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:08:45.509  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:08:45.612  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:08:45.613  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:08:45.613 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:08:45.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:08:45.618  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:08:45.618  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:08:45.623  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:08:45.624  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:08:45.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:08:45.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:08:45.625 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:08:45.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:08:45.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:08:45.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:08:45.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:08:45.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:08:45.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:08:45.702 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:48:a6:72:4e:91:f3:d7:b8:1e:f8:7c:25:80:fd:e1:e6:e2:a0:d9]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 09:13:46.825  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:13:46.827 DEBUG 1 [nio-8443-exec-6] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:13:46.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 09:13:46.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:13:46.831  INFO 1 [nio-8443-exec-6] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 09:13:46.831  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:13:46.832  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:13:46.832  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:13:46.833  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:13:46.838  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:13:46.839  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:13:46.895  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:13:46.898  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:13:47.017  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:13:47.018  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:13:47.018 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:13:47.021 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:13:47.022  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:13:47.022  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:13:47.024  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:13:47.025  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:13:47.025  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:13:47.026  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:13:47.026 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:13:47.026 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:13:47.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:13:47.095 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:13:47.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:13:47.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:13:47.097 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:13:47.101 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:46:9a:f0:15:9a:41:26:f8:6f:1f:cf:e6:bb:7c:a2:19:4d:b4:4f]
            modulus: a27ae5b060aeca46c2c9046f02d18616c3a93527b279a299962c3aafd8d2d62bf33d4c4d74d8f85dac1c49d2e5c1d38ecf2cb85267224743af86a8f0dee1e48a1d0113f4ed98fb974c3236c01578ccf6ca71455e4295c2b2374d70ebe44a0fc2301a75a97c79eafa803cc5d52ef2bed70e044d7c6d72c203902bf0fde8c8e1c53a691972a25bb259c7841855d558554d7680c37a33a95ae39ce2863115562a58c3dd363553a254d22af531a01b022de411a0d99026a1de9417262b47573eb0e4b596b50c606e47deb7f43079f6dd25334dea75d5e8033baa67d29bd454407add54a6fe64f7a0803f9afbabae2f7b2e1d04564d4764f351b872bbd19f72c144e1
    public exponent: 10001

] 
2021-06-05 09:14:27.810  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:14:27.811 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:14:27.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-05 09:14:27.813 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:14:27.813  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [https-server] }
2021-06-05 09:14:27.814  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:14:27.814  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:14:27.815  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:14:27.815  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:14:27.822  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:14:27.823  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:14:27.824  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:14:27.825  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:14:27.995  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:14:27.996  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:14:27.997 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:14:27.998 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:14:27.999  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:14:27.999  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:14:28.001  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:14:28.002  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:14:28.003  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:14:28.003  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:14:28.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:14:28.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:14:28.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:14:28.005 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:14:28.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:14:28.006 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:14:28.007 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:14:28.011 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: e7674d3438ef8fe8163e052054b0d08085cb12f086ec669149f5063d5e20fc06c4723d11b1cfd89f02eba6e6f529c97057466ed009a90c2c3d4ce4e8abad8c6bc8dcf0c94934f34413b0267b700266a7270db401f51801fc0ab7a27581a96300d4c2ac97ea1c41ba163e25fca77aa770b2def7a2d78a3c991b8c094b6bdff26258275eaa1a2f27c49f419890690c2e759d82e0ad7d79f1e0102cb18a282693ea83053b4e05f01b5ee7aa3e5074b32117f77e382e2f1973e6b36352675ea7d361c48f19c1cf05ebc4aadf453d62be7fffb18d32cf5300fd3528d0416ce9e37d2827f0468b480298b7c742131c92f4bd46ff9c970ec4cb63e057e99e4ba16ab356436df81afc2e0602016025803a46b6a974aaa85aa44f090ae6be8ece120b9444723de2d41f1b8e123bffaf3f3deec5c8778fa8459d11beefd34c1bb2edf61f1d0ca74d906331e89a1a5388d943abc8ac46f1c820141669750f83d0afc14f135ff33f1687c948711f091d455b76dfe88c9113ce8720229a022d05d294d8a09975
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:01:86:aa:1e:30:b2:06:3b:ea:79:ef:03:d3:79:fb:e0:0c:7d:7a]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 09:14:55.857  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:14:55.858 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:14:55.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-05 09:14:55.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:14:55.861  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=https-server }, SANs: [wrong-cert] }
2021-06-05 09:14:55.862  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:14:55.862  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:14:55.862  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:14:55.863  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:14:55.867  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:14:55.868  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:14:55.868  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:14:55.870  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:14:55.945  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:14:55.945  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:14:55.945 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:14:55.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:14:55.947  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:14:55.948  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:14:55.949  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:14:55.949  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:14:55.950  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:14:55.950  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:14:55.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:14:55.951 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:14:55.951 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:14:55.952 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:14:55.952 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:14:55.953 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:14:55.953 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:14:55.956 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fc:31:c8:ef:9c:e9:87:b1:0e:8e:db:f5:c9:70:cd:64:2d:75:3a:a0]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 09:15:57.346  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:15:57.348 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:15:57.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 09:15:57.350 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:15:57.351  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 09:15:57.351  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:15:57.351  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:15:57.352  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:15:57.352  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:15:57.359  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:15:57.360  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:15:57.360  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:15:57.362  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:15:57.470  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:15:57.471  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:15:57.471 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:15:57.473 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:15:57.474  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:15:57.474  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:15:57.475  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:15:57.476  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:15:57.476  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:15:57.476  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:15:57.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:15:57.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:15:57.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:15:57.478 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:15:57.478 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:15:57.478 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:15:57.479 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:15:57.481 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:07:07:c3:ac:7a:19:b7:9b:19:01:7d:81:17:26:46:77:26:cd:25]
            modulus: d027c8f48538d72d2e4bc2fde90839c9d69a1b2e7fc0959d1507ff8722045629f232972473d28845aebb65042c84358b7ff42f305274de2f0136d8884996e2dc76769416165dc9d8fc9ef488b0c0d83091ed43d8f56a6d26b05a2eba3e5bdfbbc11a50fc0479e42ba1fae75f6ffadd4d422f793cdd4a30aa8fe7d6e99eed454f3829387e2d038bc530f3cd60f1ed0bf8415de6c1024d6bbb039ffb35e7396d1773a7d46b27a0e36c995ae0d2358291344d0885514520719f78e24523e73fd3df0512e7ef89891a17753eaf0fdbd67f83a4ff68bd315ecb75147000fff677d876009a688a068899b9824ffd02584930cf86df7fa0ce1585127e602fee0eaf9371
    public exponent: 10001

] 
2021-06-05 09:16:18.247  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:16:18.248 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:16:18.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-05 09:16:18.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:16:18.250  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=ves-client }, SANs: [ves-client] }
2021-06-05 09:16:18.250  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:16:18.251  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:16:18.251  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:16:18.251  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:16:18.255  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:16:18.256  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:16:18.256  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:16:18.257  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:16:18.323  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:16:18.324  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:16:18.324 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:16:18.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:16:18.327  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:16:18.327  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:16:18.329  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:16:18.329  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:16:18.330  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:16:18.330  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:16:18.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:16:18.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:16:18.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:16:18.331 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:16:18.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:16:18.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:16:18.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:16:18.395 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8e:b8:2d:fa:d0:f6:48:c8:61:e1:33:ca:3a:1c:de:0f:dc:ab:23:ab]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 09:18:02.841  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:18:02.842 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:18:02.843 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 09:18:02.843 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:18:02.844  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 09:18:02.844  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:18:02.844  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:18:02.845  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:18:02.845  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:18:02.851  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:18:02.852  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:18:02.852  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:18:02.854  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:18:02.963  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:18:02.963  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:18:02.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:18:02.996 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:18:02.996  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:18:02.997  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:18:02.998  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:18:02.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:18:02.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:18:02.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:18:02.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:18:03.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:18:03.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:18:03.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:18:03.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:18:03.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:18:03.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:18:03.004 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:72:ff:9b:70:21:c2:2b:f2:2f:58:a7:4b:1d:34:53:19:16:90:0c]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 09:18:20.869  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:18:20.870 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:18:20.871 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-05 09:18:20.872 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:18:20.872  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-05 09:18:20.873  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:18:20.873  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:18:20.873  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:18:20.874  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:18:20.878  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:18:20.878  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:18:20.879  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:18:20.880  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:18:20.935  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:18:20.936  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:18:20.936 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:18:20.938 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:18:20.938  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:18:20.938  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:18:20.939  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:18:20.940  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:18:20.940  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:18:20.940  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:18:20.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:18:20.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:18:20.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:18:20.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:18:20.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:18:20.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:18:20.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:18:20.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:6a:74:c4:44:11:6f:9e:da:5b:df:30:b9:2c:d5:49:06:b6:53:5d]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 09:20:40.148  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:20:40.149 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:20:40.150 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 09:20:40.150 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:20:40.150  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 09:20:40.151  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:20:40.152  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:20:40.152  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:20:40.152  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:20:40.157  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:20:40.157  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:20:40.158  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:20:40.160  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:20:40.242  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:20:40.242  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:20:40.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:20:40.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:20:40.245  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:20:40.245  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:20:40.247  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:20:40.247  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:20:40.248  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:20:40.248  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:20:40.248 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:20:40.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:20:40.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:20:40.250 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:20:40.250 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:20:40.250 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:20:40.251 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:20:40.254 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: e7674d3438ef8fe8163e052054b0d08085cb12f086ec669149f5063d5e20fc06c4723d11b1cfd89f02eba6e6f529c97057466ed009a90c2c3d4ce4e8abad8c6bc8dcf0c94934f34413b0267b700266a7270db401f51801fc0ab7a27581a96300d4c2ac97ea1c41ba163e25fca77aa770b2def7a2d78a3c991b8c094b6bdff26258275eaa1a2f27c49f419890690c2e759d82e0ad7d79f1e0102cb18a282693ea83053b4e05f01b5ee7aa3e5074b32117f77e382e2f1973e6b36352675ea7d361c48f19c1cf05ebc4aadf453d62be7fffb18d32cf5300fd3528d0416ce9e37d2827f0468b480298b7c742131c92f4bd46ff9c970ec4cb63e057e99e4ba16ab356436df81afc2e0602016025803a46b6a974aaa85aa44f090ae6be8ece120b9444723de2d41f1b8e123bffaf3f3deec5c8778fa8459d11beefd34c1bb2edf61f1d0ca74d906331e89a1a5388d943abc8ac46f1c820141669750f83d0afc14f135ff33f1687c948711f091d455b76dfe88c9113ce8720229a022d05d294d8a09975
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:ff:2d:25:1d:1f:8d:57:44:8f:c6:7c:bc:64:51:21:8a:6b:cb:78]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 09:22:18.448  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:22:18.449 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:22:18.450 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 09:22:18.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:22:18.451  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 09:22:18.451  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:22:18.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:22:18.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:22:18.452  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:22:18.457  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:22:18.458  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:22:18.458  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:22:18.459  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:22:18.546  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:22:18.547  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:22:18.548 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:22:18.549 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:22:18.550  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:22:18.550  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:22:18.551  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:22:18.552  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:22:18.552  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:22:18.552  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:22:18.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:22:18.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:22:18.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:22:18.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:22:18.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:22:18.555 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:22:18.555 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:22:18.558 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3d:6f:d8:1b:6c:37:5c:ae:93:f2:5d:41:62:2b:53:2e:17:cd:c3:8d]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 09:23:12.829  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:23:12.830 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:23:12.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-05 09:23:12.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:23:12.832  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-05 09:23:12.833  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:23:12.833  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:23:12.834  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:23:12.834  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:23:12.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:23:12.841  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:23:12.841  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:23:12.843  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:23:12.928  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:23:12.929  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:23:12.929 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:23:12.931 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:23:12.932  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:23:12.932  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:23:12.933  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:23:12.934  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:23:12.934  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:23:12.934  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:23:12.935 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:23:12.935 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:23:12.935 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:23:12.936 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:23:12.936 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:23:12.936 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:23:12.937 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:23:12.940 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [91:5d:92:b3:ae:83:41:bb:0a:95:b5:ce:be:92:3a:02:65:5b:4a:56]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 09:23:50.135  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:23:50.136 DEBUG 1 [nio-8443-exec-3] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:23:50.137 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 09:23:50.137 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:23:50.138  INFO 1 [nio-8443-exec-3] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-05 09:23:50.138  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:23:50.138  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:23:50.138  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:23:50.138  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:23:50.143  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:23:50.143  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:23:50.144  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:23:50.145  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:23:50.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:23:50.208  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:23:50.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:23:50.210 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:23:50.210  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:23:50.211  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:23:50.213  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:23:50.213  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:23:50.213  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:23:50.213  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:23:50.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:23:50.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:23:50.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:23:50.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:23:50.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:23:50.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:23:50.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:23:50.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1f:e1:6f:64:68:5c:6d:81:9e:be:01:73:a7:9a:32:8a:9b:71:af:6b]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 09:25:33.706  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:25:33.707 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:25:33.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 09:25:33.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:25:33.709  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-05 09:25:33.709  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:25:33.709  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:25:33.710  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:25:33.710  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:25:33.714  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:25:33.714  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:25:33.714  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:25:33.716  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:25:33.823  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:25:33.823  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:25:33.824 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:25:33.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:25:33.826  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:25:33.826  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:25:33.827  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:25:33.828  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:25:33.828  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:25:33.828  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:25:33.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:25:33.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:25:33.829 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:25:33.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:25:33.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:25:33.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:25:33.830 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:25:33.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5b:5d:69:9f:7d:24:be:60:bf:c7:5c:af:97:82:da:f6:3e:b9:84:5d]
            modulus: 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
    public exponent: 10001

] 
2021-06-05 09:27:59.327  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-05 09:27:59.328 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-05 09:27:59.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-05 09:27:59.330 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-05 09:27:59.330  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { L=San-Francisco,OU=ONAP,O=Linux-Foundation,ST=California,C=US,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-05 09:27:59.331  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-05 09:27:59.331  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-05 09:27:59.331  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-05 09:27:59.332  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-05 09:27:59.335  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-05 09:27:59.336  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:27:59.336  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-05 09:27:59.338  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-05 09:27:59.408  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-05 09:27:59.409  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-05 09:27:59.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-05 09:27:59.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-05 09:27:59.411  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1873
2021-06-05 09:27:59.411  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-05 09:27:59.413  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-05 09:27:59.414  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-05 09:27:59.414  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-05 09:27:59.414  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-05 09:27:59.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:27:59.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:27:59.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:27:59.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-05 09:27:59.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-05 09:27:59.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-05 09:27:59.417 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-05 09:27:59.420 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 477579153909554245267663501758730894661615251439
             IssuerDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 05 07:21:38 UTC 2021
           Final Date: Thu Jun 05 07:21:37 UTC 2031
            SubjectDN: UID=c-0unz2axmlggokcwh2,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [74:6e:ac:a8:1b:a6:05:1e:c5:dd:46:ef:ca:49:6d:a3:ad:0b:74:e7]
            modulus: e7674d3438ef8fe8163e052054b0d08085cb12f086ec669149f5063d5e20fc06c4723d11b1cfd89f02eba6e6f529c97057466ed009a90c2c3d4ce4e8abad8c6bc8dcf0c94934f34413b0267b700266a7270db401f51801fc0ab7a27581a96300d4c2ac97ea1c41ba163e25fca77aa770b2def7a2d78a3c991b8c094b6bdff26258275eaa1a2f27c49f419890690c2e759d82e0ad7d79f1e0102cb18a282693ea83053b4e05f01b5ee7aa3e5074b32117f77e382e2f1973e6b36352675ea7d361c48f19c1cf05ebc4aadf453d62be7fffb18d32cf5300fd3528d0416ce9e37d2827f0468b480298b7c742131c92f4bd46ff9c970ec4cb63e057e99e4ba16ab356436df81afc2e0602016025803a46b6a974aaa85aa44f090ae6be8ece120b9444723de2d41f1b8e123bffaf3f3deec5c8778fa8459d11beefd34c1bb2edf61f1d0ca74d906331e89a1a5388d943abc8ac46f1c820141669750f83d0afc14f135ff33f1687c948711f091d455b76dfe88c9113ce8720229a022d05d294d8a09975
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8223fc2baa004d56c3f824023647bafbccdfa8a6
                       9bb0cf90f957a927f0630e6661f637ec1ff1ffee
                       8188c7661e5901c85470a3a057838ace7e69b965
                       b08ac04e6d1ae12f54920ddec4dcf2882e2b51c9
                       5cfb7c836141da791cffad741f14e4873c733164
                       b9b4580fc3a9e1e1f1cff33faa077cd298c912ce
                       9e8cfe5a15c0eb55205c8da325b72ec0b273aaa7
                       06d13bde26293d9adfe424ad4a7e4d95fc1b1499
                       7ef920f777046115ac702c3841ab685127076052
                       4ffc47d386f4564ca70d4cffdb1b4c3708423207
                       b58dd90f508338c2d63bfe847320efe0160b2421
                       d7357b052c772e5595a37014eaf8c33e0bb460c4
                       ee080966d3b99c4854f1ba9f5c294ccbc734fe6e
                       bbcf39d831d40ec10a0be7ca57451f18a7f31156
                       0f56fdeebf90f4923ca971ce6fb924a724f2936b
                       9c0e0006924024711bd68c605f09fb33887852ad
                       2ce865ebd85020418e9c684113486223647489b2
                       da72af5b619f6f2e342004df94f650c0f09f5744
                       25f54b00dfca17e885a9ed124b8d4e5ab34c6d66
                       fb151079
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:7f:3c:d5:c6:c6:04:b1:e5:f6:1f:2a:25:3a:48:5d:ae:71:c1:3e]
            modulus: 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
    public exponent: 10001

]