Results

By type

          2021-06-11 01:35:51,739 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-06-11 01:35:55,022 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-06-11 01:35:57.517  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-06-11 01:36:08.231 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-06-11 01:36:09.322  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-06-11 01:36:10.016  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-06-11 01:36:21.830  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 32.112 seconds (JVM running for 38.772)
2021-06-11 01:38:13.324  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 01:38:13.416 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 01:38:13.523 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-11 01:38:13.526 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 01:38:13.539  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-06-11 01:38:13.617  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 01:38:13.622  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:38:13.623  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:38:13.624  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 01:38:13.631  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 01:38:13.634  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 01:38:13.830  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 01:38:13.835  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:38:13.835  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 01:38:13.926  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 01:38:15.067  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 01:38:15.070  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 01:38:15.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 01:38:15.075 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 01:38:15.076  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1339
2021-06-11 01:38:15.115  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 01:38:15.119  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 01:38:15.120  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 01:38:15.135  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 01:38:15.137  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 01:38:15.137 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:38:15.138 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:38:15.138 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:38:15.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 01:38:15.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 01:38:15.225 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 01:38:15.233 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 01:38:15.332 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 721529523462276961896077890642873799873156105366
             IssuerDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 11 01:31:46 UTC 2021
           Final Date: Wed Jun 11 01:31:45 UTC 2031
            SubjectDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fe:54:43:f2:53:e7:2d:da:16:09:07:30:8e:56:75:ec:e9:ba:af:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77ea4797c913a2e1d84916eb4271b44dfa4fa6ca
                       1698ac3258d3a46f9bd2da32bd092f9f0b67f20a
                       3995170e575d58581ba33f0adc594902dac18793
                       bbe4764b5a97e3b3fe31dc2e31b16edc8aed63f3
                       5408411279f47390c204faa62cf83f02fc6b9071
                       35cd81a34ee64279f9a63381ab018feccfb81829
                       0df407363c60d53620231c846038c0acdefb8c12
                       15348b323f5ff746d2cc62397a97ea82197fcef7
                       6f143653a14e710ea0f1031aec94ae325bee637c
                       3388eee820335b7e696fe87981c66a26d02847ef
                       00b82c4bf93a670e623064eba3953bfafac297e4
                       f1811b780123b189acdd7755872ec1de9c8bdc49
                       06e4119cde83805ead18f7c8a3264392251c413b
                       09dd1c9865077b4815ca92fda717d04adcb0bf70
                       727c3d3c13ef5e6901e887ff37ec1ae11d73609d
                       64aeafbb1e076663d405ef14df9a619da8335892
                       0fa2f5ae985d46c310b3227c5ef3d8a2b04c410a
                       9641a761d1260c5367803091cc64598743074f1f
                       6818cad1a8343a4c022c3143ade0189330b84f2e
                       c6c069fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [34:ea:b4:0f:58:3e:b5:cf:db:20:6f:b2:91:30:10:dd:c2:3c:30:4c]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 03:25:11.488  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 03:25:11.490 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 03:25:11.492 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 03:25:11.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 03:25:11.495  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-06-11 03:25:11.496  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 03:25:11.497  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 03:25:11.498  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 03:25:11.499  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 03:25:11.518  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 03:25:11.519  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:25:11.519  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:25:11.522  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 03:25:11.635  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 03:25:11.636  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 03:25:11.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 03:25:11.640 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 03:25:11.641  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1339
2021-06-11 03:25:11.642  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 03:25:11.645  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 03:25:11.645  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 03:25:11.646  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 03:25:11.646  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 03:25:11.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:25:11.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:25:11.647 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:25:11.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:25:11.716 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:25:11.716 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:25:11.717 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 03:25:11.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 721529523462276961896077890642873799873156105366
             IssuerDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 11 01:31:46 UTC 2021
           Final Date: Wed Jun 11 01:31:45 UTC 2031
            SubjectDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fe:54:43:f2:53:e7:2d:da:16:09:07:30:8e:56:75:ec:e9:ba:af:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77ea4797c913a2e1d84916eb4271b44dfa4fa6ca
                       1698ac3258d3a46f9bd2da32bd092f9f0b67f20a
                       3995170e575d58581ba33f0adc594902dac18793
                       bbe4764b5a97e3b3fe31dc2e31b16edc8aed63f3
                       5408411279f47390c204faa62cf83f02fc6b9071
                       35cd81a34ee64279f9a63381ab018feccfb81829
                       0df407363c60d53620231c846038c0acdefb8c12
                       15348b323f5ff746d2cc62397a97ea82197fcef7
                       6f143653a14e710ea0f1031aec94ae325bee637c
                       3388eee820335b7e696fe87981c66a26d02847ef
                       00b82c4bf93a670e623064eba3953bfafac297e4
                       f1811b780123b189acdd7755872ec1de9c8bdc49
                       06e4119cde83805ead18f7c8a3264392251c413b
                       09dd1c9865077b4815ca92fda717d04adcb0bf70
                       727c3d3c13ef5e6901e887ff37ec1ae11d73609d
                       64aeafbb1e076663d405ef14df9a619da8335892
                       0fa2f5ae985d46c310b3227c5ef3d8a2b04c410a
                       9641a761d1260c5367803091cc64598743074f1f
                       6818cad1a8343a4c022c3143ade0189330b84f2e
                       c6c069fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d8:b4:2b:1f:9c:a3:33:4b:f5:f1:84:1c:a0:9a:d7:43:f0:02:a3:ef]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 03:26:36.344  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 03:26:36.345 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 03:26:36.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-11 03:26:36.348 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 03:26:36.348  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=pnf-simulator }, SANs: [pnf-simulator] }
2021-06-11 03:26:36.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 03:26:36.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 03:26:36.351  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 03:26:36.351  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 03:26:36.418  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 03:26:36.419  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:26:36.419  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:26:36.421  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 03:26:36.492  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 03:26:36.493  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 03:26:36.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 03:26:36.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 03:26:36.528  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1339
2021-06-11 03:26:36.529  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 03:26:36.530  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 03:26:36.531  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 03:26:36.532  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 03:26:36.532  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 03:26:36.616 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:26:36.617 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:26:36.617 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:26:36.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:26:36.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:26:36.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:26:36.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=pnf-simulator,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 03:26:36.627 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 721529523462276961896077890642873799873156105366
             IssuerDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 11 01:31:46 UTC 2021
           Final Date: Wed Jun 11 01:31:45 UTC 2031
            SubjectDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fe:54:43:f2:53:e7:2d:da:16:09:07:30:8e:56:75:ec:e9:ba:af:3f]
            modulus: c4dfeadabb87d068a500cee2ca159c92b58c441bb6103d757230837bab2b4ef48a8e6b86ed76c03bb44740a168bcc5dc0e1c82efc4e7ceaebcdf083311829fc02d418c112f1f2822318542e77e8af0fa24c9ffa454faea5bde9b53200609bee59e235edac54986d9bc6cbdcac126d2212e8e1ce583edde34e18acdea9c067457a83a57af541141cfea3b48d14629e3919b263e77d9d8630a3fe98b81f14338fd3de80bf38093520864d7308d8c3d6474198fa05336f0b5e4b1817e536375adaf87e4e1edc41ffceef525afb66aaa0f2e04a23afa04b551c15fff2105886792919b07b63ceac9ba051acc138c435cedb6bd634298e24983e509734853d04cc8171a0f53260361a08ea5a02d9ab3b54839c4f09033e090979a14ee30cccb1e9af3dc3c0aafddd45e5beeeff1de63fe12a98467ae6de5fae3caeb7f6925c3937530cbc9839865df5512d52fb31b56c3d7309064e162dc3c2c5a43465627aa84b21d6b274b72cc9459f127cfa8287dddd0893d24e26eb405cf0902db5f763b9455df
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77ea4797c913a2e1d84916eb4271b44dfa4fa6ca
                       1698ac3258d3a46f9bd2da32bd092f9f0b67f20a
                       3995170e575d58581ba33f0adc594902dac18793
                       bbe4764b5a97e3b3fe31dc2e31b16edc8aed63f3
                       5408411279f47390c204faa62cf83f02fc6b9071
                       35cd81a34ee64279f9a63381ab018feccfb81829
                       0df407363c60d53620231c846038c0acdefb8c12
                       15348b323f5ff746d2cc62397a97ea82197fcef7
                       6f143653a14e710ea0f1031aec94ae325bee637c
                       3388eee820335b7e696fe87981c66a26d02847ef
                       00b82c4bf93a670e623064eba3953bfafac297e4
                       f1811b780123b189acdd7755872ec1de9c8bdc49
                       06e4119cde83805ead18f7c8a3264392251c413b
                       09dd1c9865077b4815ca92fda717d04adcb0bf70
                       727c3d3c13ef5e6901e887ff37ec1ae11d73609d
                       64aeafbb1e076663d405ef14df9a619da8335892
                       0fa2f5ae985d46c310b3227c5ef3d8a2b04c410a
                       9641a761d1260c5367803091cc64598743074f1f
                       6818cad1a8343a4c022c3143ade0189330b84f2e
                       c6c069fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:65:68:73:43:44:fd:41:d9:d5:bf:a2:80:76:4f:2c:83:84:01:fb]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 03:29:27.055  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 03:29:27.057 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 03:29:27.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-11 03:29:27.059 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 03:29:27.059  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-11 03:29:27.060  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 03:29:27.060  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 03:29:27.061  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 03:29:27.061  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 03:29:27.068  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 03:29:27.115  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:29:27.115  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:29:27.117  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 03:29:27.183  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 03:29:27.184  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 03:29:27.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 03:29:27.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 03:29:27.216  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1339
2021-06-11 03:29:27.216  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 03:29:27.218  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 03:29:27.218  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 03:29:27.219  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 03:29:27.219  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 03:29:27.220 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:29:27.220 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:29:27.220 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:29:27.221 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:29:27.221 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:29:27.222 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:29:27.222 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 03:29:27.225 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 721529523462276961896077890642873799873156105366
             IssuerDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 11 01:31:46 UTC 2021
           Final Date: Wed Jun 11 01:31:45 UTC 2031
            SubjectDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fe:54:43:f2:53:e7:2d:da:16:09:07:30:8e:56:75:ec:e9:ba:af:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77ea4797c913a2e1d84916eb4271b44dfa4fa6ca
                       1698ac3258d3a46f9bd2da32bd092f9f0b67f20a
                       3995170e575d58581ba33f0adc594902dac18793
                       bbe4764b5a97e3b3fe31dc2e31b16edc8aed63f3
                       5408411279f47390c204faa62cf83f02fc6b9071
                       35cd81a34ee64279f9a63381ab018feccfb81829
                       0df407363c60d53620231c846038c0acdefb8c12
                       15348b323f5ff746d2cc62397a97ea82197fcef7
                       6f143653a14e710ea0f1031aec94ae325bee637c
                       3388eee820335b7e696fe87981c66a26d02847ef
                       00b82c4bf93a670e623064eba3953bfafac297e4
                       f1811b780123b189acdd7755872ec1de9c8bdc49
                       06e4119cde83805ead18f7c8a3264392251c413b
                       09dd1c9865077b4815ca92fda717d04adcb0bf70
                       727c3d3c13ef5e6901e887ff37ec1ae11d73609d
                       64aeafbb1e076663d405ef14df9a619da8335892
                       0fa2f5ae985d46c310b3227c5ef3d8a2b04c410a
                       9641a761d1260c5367803091cc64598743074f1f
                       6818cad1a8343a4c022c3143ade0189330b84f2e
                       c6c069fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:7a:ff:1e:4a:ce:64:af:35:57:fe:19:90:8a:c1:21:4b:e0:b4:0f]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 03:29:29.512  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 03:29:29.514 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 03:29:29.515 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-11 03:29:29.516 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 03:29:29.517  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-06-11 03:29:29.518  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 03:29:29.518  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 03:29:29.519  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 03:29:29.520  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 03:29:29.526  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 03:29:29.527  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:29:29.528  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:29:29.529  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 03:29:29.586  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 03:29:29.615  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 03:29:29.615 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 03:29:29.617 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 03:29:29.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1339
2021-06-11 03:29:29.618  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 03:29:29.619  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 03:29:29.620  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 03:29:29.620  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 03:29:29.620  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 03:29:29.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:29:29.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:29:29.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:29:29.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:29:29.623 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:29:29.623 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:29:29.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 03:29:29.628 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 721529523462276961896077890642873799873156105366
             IssuerDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 11 01:31:46 UTC 2021
           Final Date: Wed Jun 11 01:31:45 UTC 2031
            SubjectDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fe:54:43:f2:53:e7:2d:da:16:09:07:30:8e:56:75:ec:e9:ba:af:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77ea4797c913a2e1d84916eb4271b44dfa4fa6ca
                       1698ac3258d3a46f9bd2da32bd092f9f0b67f20a
                       3995170e575d58581ba33f0adc594902dac18793
                       bbe4764b5a97e3b3fe31dc2e31b16edc8aed63f3
                       5408411279f47390c204faa62cf83f02fc6b9071
                       35cd81a34ee64279f9a63381ab018feccfb81829
                       0df407363c60d53620231c846038c0acdefb8c12
                       15348b323f5ff746d2cc62397a97ea82197fcef7
                       6f143653a14e710ea0f1031aec94ae325bee637c
                       3388eee820335b7e696fe87981c66a26d02847ef
                       00b82c4bf93a670e623064eba3953bfafac297e4
                       f1811b780123b189acdd7755872ec1de9c8bdc49
                       06e4119cde83805ead18f7c8a3264392251c413b
                       09dd1c9865077b4815ca92fda717d04adcb0bf70
                       727c3d3c13ef5e6901e887ff37ec1ae11d73609d
                       64aeafbb1e076663d405ef14df9a619da8335892
                       0fa2f5ae985d46c310b3227c5ef3d8a2b04c410a
                       9641a761d1260c5367803091cc64598743074f1f
                       6818cad1a8343a4c022c3143ade0189330b84f2e
                       c6c069fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a1:d6:18:20:6c:1c:20:58:1b:c6:56:0f:30:b4:0e:21:e0:ff:90:06]
            modulus: a1486496b7da1df11259e3acee9098456e022a2523338b642add5b23545502ce930d597804f2e833edc536bbfca6add6ec3db72a9ef45f87293d47a2fc597883c99f975ff2353f3e638bda22f9d0cbc9620c9df968564d960c9346e040ec1c841be2672ab80cd1dc26805583ee7b8ac220499043cf1788aab92ae303f27781fd5bba95690cd81c2fd83dad4c8469bf6a054a358eb060eb03894b81e15c3eb06809fceb200570ce8a775b2652a7ccf64b3585838987d8ec21fcb6643d4c1953191a8c93951caab647895820dc2633e5e8cead9bb60ac61d1e8dd0ab9655715bd0c709617034f4070a4351a71abafad71d292c357b3f31933bde00fd00d31e0593
    public exponent: 10001

] 
2021-06-11 03:29:57.759  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 03:29:57.760 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 03:29:57.761 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-06-11 03:29:57.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 03:29:57.762  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-06-11 03:29:57.763  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 03:29:57.763  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 03:29:57.763  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 03:29:57.763  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 03:29:57.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 03:29:57.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:29:57.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:29:57.770  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 03:29:57.828  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 03:29:57.828  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 03:29:57.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 03:29:57.831 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 03:29:57.831  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1339
2021-06-11 03:29:57.832  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 03:29:57.833  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 03:29:57.834  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 03:29:57.834  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 03:29:57.835  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 03:29:57.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:29:57.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:29:57.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:29:57.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:29:57.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:29:57.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:29:57.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 03:29:57.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 721529523462276961896077890642873799873156105366
             IssuerDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 11 01:31:46 UTC 2021
           Final Date: Wed Jun 11 01:31:45 UTC 2031
            SubjectDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fe:54:43:f2:53:e7:2d:da:16:09:07:30:8e:56:75:ec:e9:ba:af:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77ea4797c913a2e1d84916eb4271b44dfa4fa6ca
                       1698ac3258d3a46f9bd2da32bd092f9f0b67f20a
                       3995170e575d58581ba33f0adc594902dac18793
                       bbe4764b5a97e3b3fe31dc2e31b16edc8aed63f3
                       5408411279f47390c204faa62cf83f02fc6b9071
                       35cd81a34ee64279f9a63381ab018feccfb81829
                       0df407363c60d53620231c846038c0acdefb8c12
                       15348b323f5ff746d2cc62397a97ea82197fcef7
                       6f143653a14e710ea0f1031aec94ae325bee637c
                       3388eee820335b7e696fe87981c66a26d02847ef
                       00b82c4bf93a670e623064eba3953bfafac297e4
                       f1811b780123b189acdd7755872ec1de9c8bdc49
                       06e4119cde83805ead18f7c8a3264392251c413b
                       09dd1c9865077b4815ca92fda717d04adcb0bf70
                       727c3d3c13ef5e6901e887ff37ec1ae11d73609d
                       64aeafbb1e076663d405ef14df9a619da8335892
                       0fa2f5ae985d46c310b3227c5ef3d8a2b04c410a
                       9641a761d1260c5367803091cc64598743074f1f
                       6818cad1a8343a4c022c3143ade0189330b84f2e
                       c6c069fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:f8:bc:b1:40:60:9a:d7:7a:a4:f7:d9:68:16:7f:3a:44:54:68:f7]
            modulus: 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
    public exponent: 10001

] 
2021-06-11 03:30:31.925  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 03:30:31.926 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 03:30:31.927 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-06-11 03:30:31.928 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 03:30:31.928  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-06-11 03:30:31.929  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 03:30:31.929  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 03:30:31.929  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 03:30:31.930  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 03:30:31.934  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 03:30:31.934  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:30:31.935  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:30:31.936  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 03:30:32.007  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 03:30:32.008  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 03:30:32.015 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 03:30:32.016 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 03:30:32.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1339
2021-06-11 03:30:32.017  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 03:30:32.018  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 03:30:32.019  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 03:30:32.019  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 03:30:32.020  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 03:30:32.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:30:32.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:30:32.021 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:30:32.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:30:32.022 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:30:32.023 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:30:32.024 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 03:30:32.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 721529523462276961896077890642873799873156105366
             IssuerDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 11 01:31:46 UTC 2021
           Final Date: Wed Jun 11 01:31:45 UTC 2031
            SubjectDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fe:54:43:f2:53:e7:2d:da:16:09:07:30:8e:56:75:ec:e9:ba:af:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77ea4797c913a2e1d84916eb4271b44dfa4fa6ca
                       1698ac3258d3a46f9bd2da32bd092f9f0b67f20a
                       3995170e575d58581ba33f0adc594902dac18793
                       bbe4764b5a97e3b3fe31dc2e31b16edc8aed63f3
                       5408411279f47390c204faa62cf83f02fc6b9071
                       35cd81a34ee64279f9a63381ab018feccfb81829
                       0df407363c60d53620231c846038c0acdefb8c12
                       15348b323f5ff746d2cc62397a97ea82197fcef7
                       6f143653a14e710ea0f1031aec94ae325bee637c
                       3388eee820335b7e696fe87981c66a26d02847ef
                       00b82c4bf93a670e623064eba3953bfafac297e4
                       f1811b780123b189acdd7755872ec1de9c8bdc49
                       06e4119cde83805ead18f7c8a3264392251c413b
                       09dd1c9865077b4815ca92fda717d04adcb0bf70
                       727c3d3c13ef5e6901e887ff37ec1ae11d73609d
                       64aeafbb1e076663d405ef14df9a619da8335892
                       0fa2f5ae985d46c310b3227c5ef3d8a2b04c410a
                       9641a761d1260c5367803091cc64598743074f1f
                       6818cad1a8343a4c022c3143ade0189330b84f2e
                       c6c069fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:3b:8c:2e:a4:17:e6:d8:c7:1d:5c:9d:90:c6:51:e2:c2:a7:44:d0]
            modulus: eb8e77bd84175d965eb63ff82448035dbefc00132c7c63574ffef7a4a5ed71b51d6d698f6bbba3bd1a319e09d1473ebd27b0b97a95281744e33847eedad86d27b6a9ca541efe640e405797be120a6976cb827a1d95e02b9ebb19ddecebb3b349918b1b4bbfdf97c23e00b4f6f0b9d90237a5898a39df0a750681506fffdb2b4995cb4018edaae9d399350c19acbbd1998529d8c057f68c793281a1911e3b19f4e1f007853eb0d91d75b4f945adde2b47881b878ae3f89c013ddd86cecfbe30b70750bba9d0ed09b90aed7c7e14ce0c329f4c375bc3d9345cf5945a02536954133f15252ed4b636704ad3bcc0b605804673b70d848262920c59dbac266e12e403
    public exponent: 10001

] 
2021-06-11 03:32:01.276  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 03:32:01.277 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 03:32:01.279 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-11 03:32:01.279 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 03:32:01.279  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-06-11 03:32:01.280  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 03:32:01.280  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 03:32:01.281  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 03:32:01.281  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 03:32:01.285  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 03:32:01.286  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:32:01.286  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:32:01.287  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 03:32:01.361  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 03:32:01.362  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 03:32:01.362 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 03:32:01.363 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 03:32:01.363  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1339
2021-06-11 03:32:01.364  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 03:32:01.365  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 03:32:01.366  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 03:32:01.366  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 03:32:01.366  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 03:32:01.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:32:01.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:32:01.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:32:01.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:32:01.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:32:01.369 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:32:01.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 03:32:01.372 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 721529523462276961896077890642873799873156105366
             IssuerDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 11 01:31:46 UTC 2021
           Final Date: Wed Jun 11 01:31:45 UTC 2031
            SubjectDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fe:54:43:f2:53:e7:2d:da:16:09:07:30:8e:56:75:ec:e9:ba:af:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77ea4797c913a2e1d84916eb4271b44dfa4fa6ca
                       1698ac3258d3a46f9bd2da32bd092f9f0b67f20a
                       3995170e575d58581ba33f0adc594902dac18793
                       bbe4764b5a97e3b3fe31dc2e31b16edc8aed63f3
                       5408411279f47390c204faa62cf83f02fc6b9071
                       35cd81a34ee64279f9a63381ab018feccfb81829
                       0df407363c60d53620231c846038c0acdefb8c12
                       15348b323f5ff746d2cc62397a97ea82197fcef7
                       6f143653a14e710ea0f1031aec94ae325bee637c
                       3388eee820335b7e696fe87981c66a26d02847ef
                       00b82c4bf93a670e623064eba3953bfafac297e4
                       f1811b780123b189acdd7755872ec1de9c8bdc49
                       06e4119cde83805ead18f7c8a3264392251c413b
                       09dd1c9865077b4815ca92fda717d04adcb0bf70
                       727c3d3c13ef5e6901e887ff37ec1ae11d73609d
                       64aeafbb1e076663d405ef14df9a619da8335892
                       0fa2f5ae985d46c310b3227c5ef3d8a2b04c410a
                       9641a761d1260c5367803091cc64598743074f1f
                       6818cad1a8343a4c022c3143ade0189330b84f2e
                       c6c069fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [04:5f:6b:f2:b7:16:86:a1:c3:d2:7f:0a:6c:33:e8:d4:98:30:76:e2]
            modulus: e1b2d21d7dc5f9e41f8fa9de9259a6affe32ac60835da839278dd1be178a2998a95646ec1f56c7ebf12b5319badb6e58c7444fba1a7861dab5cedf1c334564387c926e3b64b52dbea1d892021d2b8b565a43102a65d4c9230f2f54ec46f6df76f4464d4af10a3a61f0465c39991fdbbb06a41d5218cd395d1799c82a521b267d0dd998761f34c22c6a26aa74f9a9b042631dba2c3dafae5517af2410c0804cc8e3f2df08a6875a614d033fe8b6ddc94509de719f9900044f886923ba22dcb3bcc3b961e603b3ec78e38dd6aeba2d77b57c468ffa4f2d69622b60e15ab2bb979d2642262c669599aa3612b0437116b4ace814adfb601bd85d39125b6067355d13
    public exponent: 10001

] 
2021-06-11 03:32:56.096  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-06-11 03:32:56.097 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-06-11 03:32:56.098 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-06-11 03:32:56.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-06-11 03:32:56.099  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-06-11 03:32:56.100  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-06-11 03:32:56.100  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-06-11 03:32:56.100  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-06-11 03:32:56.100  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-06-11 03:32:56.104  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-06-11 03:32:56.105  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:32:56.105  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-06-11 03:32:56.106  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-06-11 03:32:56.215  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-06-11 03:32:56.216  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-06-11 03:32:56.216 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-06-11 03:32:56.218 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-06-11 03:32:56.219  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1339
2021-06-11 03:32:56.219  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-06-11 03:32:56.220  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-06-11 03:32:56.221  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-06-11 03:32:56.221  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-06-11 03:32:56.221  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-06-11 03:32:56.222 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:32:56.222 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:32:56.222 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:32:56.223 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-06-11 03:32:56.223 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-06-11 03:32:56.224 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-06-11 03:32:56.224 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
2021-06-11 03:32:56.227 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 721529523462276961896077890642873799873156105366
             IssuerDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jun 11 01:31:46 UTC 2021
           Final Date: Wed Jun 11 01:31:45 UTC 2031
            SubjectDN: UID=c-0lhr4tll2zexrdfdl,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [fe:54:43:f2:53:e7:2d:da:16:09:07:30:8e:56:75:ec:e9:ba:af:3f]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77ea4797c913a2e1d84916eb4271b44dfa4fa6ca
                       1698ac3258d3a46f9bd2da32bd092f9f0b67f20a
                       3995170e575d58581ba33f0adc594902dac18793
                       bbe4764b5a97e3b3fe31dc2e31b16edc8aed63f3
                       5408411279f47390c204faa62cf83f02fc6b9071
                       35cd81a34ee64279f9a63381ab018feccfb81829
                       0df407363c60d53620231c846038c0acdefb8c12
                       15348b323f5ff746d2cc62397a97ea82197fcef7
                       6f143653a14e710ea0f1031aec94ae325bee637c
                       3388eee820335b7e696fe87981c66a26d02847ef
                       00b82c4bf93a670e623064eba3953bfafac297e4
                       f1811b780123b189acdd7755872ec1de9c8bdc49
                       06e4119cde83805ead18f7c8a3264392251c413b
                       09dd1c9865077b4815ca92fda717d04adcb0bf70
                       727c3d3c13ef5e6901e887ff37ec1ae11d73609d
                       64aeafbb1e076663d405ef14df9a619da8335892
                       0fa2f5ae985d46c310b3227c5ef3d8a2b04c410a
                       9641a761d1260c5367803091cc64598743074f1f
                       6818cad1a8343a4c022c3143ade0189330b84f2e
                       c6c069fe
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:50:38:8a:ba:99:38:8c:02:91:91:d1:a1:fc:37:c9:3f:5a:68:69]
            modulus: cd4479acc88eb09be7d1b0c54d6155707adb8f13790bafd0cca70ddbebed96f195794196ecc01378c0f3e689616dc1efc9dfa146d2d20bcfa29af491cc0ccbfd8bb2f8e924fdcfded51c3460f1307450fa06ef60526b09c013500e3b5868a4849eb2294cdfbdcdc7d0e9e0d3299bfdc850e805dd2bd5d2d511625913dab292fc9e61b43f6d570acaea529857f8501a52fc703bbd2e0d42cf9f25aa0133d0e6e055eb88c0efdc336e9f40751c94f9bb31a2c162bb772befa74d00c7b454f8dbcdeece3ef52fc9a8e1a8a991f993ea8dacc24b0843afdba3c9665b5cb7bdd8c9bf0db4cf387013db1e5c4a41f2cb1ebf4e12b58219cf3bac8be98b07ecbff9698f
    public exponent: 10001

]